[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted chromium 78.0.3904.97-1~deb10u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 09 Nov 2019 19:01:23 +0000
Source: chromium
Architecture: source
Version: 78.0.3904.97-1~deb10u1
Distribution: buster-security
Urgency: medium
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Changes:
 chromium (78.0.3904.97-1~deb10u1) buster-security; urgency=medium
 .
   * New upstream stable release.
     - CVE-2019-5869: Use-after-free in Blink. Reported by Zhe Jin
     - CVE-2019-5870: Use-after-free in media. Reported by Guang Gong
     - CVE-2019-5871: Heap overflow in Skia. Reported by Anonymous
     - CVE-2019-5872: Use-after-free in Mojo. Reported by Zhe Jin
     - CVE-2019-5874: External URIs may trigger other browsers. Reported by
       James Lee
     - CVE-2019-5875: URL bar spoof. Reported by Khalil
       Zhani
     - CVE-2019-5876: Use-after-free in media. Reported by Man Yue Mo
     - CVE-2019-5877: Out-of-bounds access in V8. Reported by Guang Gong
     - CVE-2019-5878: Use-after-free in V8. Reported by Guang Gong
     - CVE-2019-5879: Extensions can read some local files. Reported by Jinseo
       Kim
     - CVE-2019-5880: SameSite cookie bypass. Reported by Jun Kokatsu
     - CVE-2019-13659: URL spoof. Reported by Lnyas Zhang
     - CVE-2019-13660: Full screen notification overlap. Reported by Wenxu Wu
     - CVE-2019-13661: Full screen notification spoof. Reported by Wenxu Wu
     - CVE-2019-13662: CSP bypass. Reported by David Erceg
     - CVE-2019-13663: IDN spoof. Reported by Lnyas Zhang
     - CVE-2019-13664: CSRF bypass. Reported by thomas "zemnmez" shadwell
     - CVE-2019-13665: Multiple file download protection bypass. Reported by
       Jun Kokatsu
     - CVE-2019-13666: Side channel using storage size estimate. Reported by
       Tom Van Goethem
     - CVE-2019-13667: URI bar spoof when using external app URIs. Reported by
       Khalil Zhani
     - CVE-2019-13668: Global window leak via console. Reported by David Erceg
     - CVE-2019-13669: HTTP authentication spoof. Reported by Khalil Zhani
     - CVE-2019-13670: V8 memory corruption in regex. Reported by Guang Gong
     - CVE-2019-13671: Dialog box fails to show origin. Reported by xisigr
     - CVE-2019-13673: Cross-origin information leak using devtools. Reported
       by David Erceg
     - CVE-2019-13674: IDN spoofing. Reported by Khalil Zhani
     - CVE-2019-13675: Extensions can be disabled by trailing slash. Reported
       by Jun Kokatsu
     - CVE-2019-13676: Google URI shown for certificate warning. Reported by
       Wenxu Wu
     - CVE-2019-13677: Chrome web store origin needs to be isolated. Reported
       by Jun Kokatsu
     - CVE-2019-13678: Download dialog spoofing. Reported by Ronni Skansing
     - CVE-2019-13679: User gesture needed for printing. Reported by Conrad
       Irwin
     - CVE-2019-13680: IP address spoofing to servers. Reported by Thijs
       Alkemade
     - CVE-2019-13681: Bypass on download restrictions. Reported by David Erceg
     - CVE-2019-13682: Site isolation bypass. Reported by Jun Kokatsu
     - CVE-2019-13683: Exceptions leaked by devtools. Reported by David Erceg
     - CVE-2019-13685: Use-after-free in UI. Reported by Khalil Zhani
     - CVE-2019-13686: Use-after-free in offline pages. Reported by Brendon
     - CVE-2019-13687: Use-after-free in media. Reported by Man Yue Mo
     - CVE-2019-13688: Use-after-free in media. Reported by Man Yue Mo
       Tiszka
     - CVE-2019-13691: Omnibox spoof. Reported by David Erceg
     - CVE-2019-13692: SOP bypass. Reported by Jun Kokatsu
     - CVE-2019-13693: Use-after-free in IndexedDB. Reported by Guang Gong
     - CVE-2019-13694: Use-after-free in WebRTC. Reported by banananapenguin
     - CVE-2019-13695: Use-after-free in audio. Reported by Man Yue Mo
     - CVE-2019-13696: Use-after-free in V8. Reported by Guang Gong
     - CVE-2019-13697: Cross-origin size leak. Reported by Luan Herrera
     - CVE-2019-13699: Use-after-free in media. Reported by Man Yue Mo
     - CVE-2019-13700: Buffer overrun in Blink. Reported by Man Yue Mo
     - CVE-2019-13701: URL spoof in navigation. Reported by David Erceg
     - CVE-2019-13702: Privilege elevation in Installer. Reported by Phillip
       Langlois and Edward Torkington
     - CVE-2019-13703: URL bar spoofing. Reported by Khalil Zhani
     - CVE-2019-13704: CSP bypass. Reported by Jun Kokatsu
     - CVE-2019-13705: Extension permission bypass. Reported by Luan Herrera
     - CVE-2019-13706: Out-of-bounds read in PDFium. Reported by pdknsk
     - CVE-2019-13707: File storage disclosure. Reported by Andrea Palazzo
     - CVE-2019-13708: HTTP authentication spoof. Reported by Khalil Zhani
     - CVE-2019-13709: File download protection bypass. Reported by Zhong
       Zhaochen
     - CVE-2019-13710: File download protection bypass. Reported by
       bernardo.mrod
     - CVE-2019-13711: Cross-context information leak. Reported by David Erceg
     - CVE-2019-13713: Cross-origin data leak. Reported by David Erceg
     - CVE-2019-13714: CSS injection. Reported by Jun Kokatsu
     - CVE-2019-13715: Address bar spoofing. Reported by xisigr
     - CVE-2019-13716: Service worker state error. Reported by Barron Hagerman
     - CVE-2019-13717: Notification obscured. Reported by xisigr
     - CVE-2019-13718: IDN spoof. Reported by Khalil Zhani
     - CVE-2019-13719: Notification obscured. Reported by Khalil Zhani
     - CVE-2019-13720: Use-after-free in audio. Reported by Anton Ivanov and
       Alexey Kulaev
     - CVE-2019-13721: Use-after-free in PDFium. Reported by banananapenguin
Checksums-Sha1:
 377717f7c2b4a5faab14ee36483a96242d7095f1 4235 chromium_78.0.3904.97-1~deb10u1.dsc
 50b9bc5f76bdcc0a352a34ed757835ac2e76fcc6 262087832 chromium_78.0.3904.97.orig.tar.xz
 12cfe602ce32a836926fafed39f1e18dff317db4 188204 chromium_78.0.3904.97-1~deb10u1.debian.tar.xz
 65ef2e271473db506597733b13410ad9ae0c19a8 21477 chromium_78.0.3904.97-1~deb10u1_source.buildinfo
Checksums-Sha256:
 f117d76c89175b602754ec01ef47eb716b0e47647f043e7a89b6df5b330078f4 4235 chromium_78.0.3904.97-1~deb10u1.dsc
 67d24abe35375e125f8cce507a3df07f2d0e89bc592194c36df1d4b6692a9e65 262087832 chromium_78.0.3904.97.orig.tar.xz
 19de26c1229e4955d88ae65d9754ec81299e4bdb719ed8bf8a45717f2da3cf11 188204 chromium_78.0.3904.97-1~deb10u1.debian.tar.xz
 bcf23f67a4855f0e2ffe2280917e448c47dd832430b978c1e1e0e7bacb63632e 21477 chromium_78.0.3904.97-1~deb10u1_source.buildinfo
Files:
 58250f26bec11095afc13409cd0c1587 4235 web optional chromium_78.0.3904.97-1~deb10u1.dsc
 4a9336b874e9dd9865650db0c27dd2ee 262087832 web optional chromium_78.0.3904.97.orig.tar.xz
 a3aac2aa54508c2c4ff9fbca96977837 188204 web optional chromium_78.0.3904.97-1~deb10u1.debian.tar.xz
 6034d21021ac7101bf130b607e7b3100 21477 web optional chromium_78.0.3904.97-1~deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQQzBAEBCgAdFiEEIwTlZiOEpzUxIyp4mD40ZYkUaygFAl3HSS8ACgkQmD40ZYkU
aygmXCAAgaf6PdwfPR4lMEOZDy518kXhaKH/mNs2nVr/MtYnu//upny1yuvnHCw/
fK2NnTYW5XtHWs+PkpWKJzaKKyzHpZ5J7Nt5yDew/zGHKAN5EzzHMN8R9Uj/7L5e
HFZY2Pr45nsXZtCwDXiknXzKL17+AABn3aCjL14mOnDFNcCuymfNKqZn/oaYQaoT
OfTw3EH8Mp0VcERPvhutDXcM8qKaN925jLN6eA4UW9UIO0JZ2kDxwWnHypbMqMM9
bGxURJ+A2r0lvQLGOot56VOP0qC5teAZ1+kVJ2BU2XczO6jreEePG2KHLme20YUF
8i+nd2Ql0tFACpPWbrMYULkH0ZHWqLkdQgK1ChcWVPr6iz5Ll9k8UKWrvrs3Nc7d
S47CDV018jOeMPgGQHtdxqzrx6cUTsedZ6GSorUWsXQsmkb2YtvV7XgXsKB5N7/j
FahHb5FDf6iJ1Fppqk+pAe2VP3v5rEpQKBYuQE0dZLe/oih5/Ay3V2bDRgL4HMK3
rkoYtDrJXojTQdH7NodN3e1XmBa6s8G0ljHOrVUGJLo8HSduCuAfjAyuXOLrEBeQ
2BNkrhta9SyoJu0JfLZyfNb+q9EouIQfcoTolp+FH93nJ04uhmOWjPMv8wAB0Fql
kKWkjwzMHu79f8W/DVfdcROwStAqVbYTFiuJxI4sLY33NFCHiFE94ij29VO+VMXh
WMe8B7AhmEKyxWa+9ZgA0vWZ9HoiyGBM3V6i31fVfqO0NffwfY9l4BpE2OSwHTEH
AV1i3qk4jfOEgJwg4XQHZjJuEg22FkwfBnDpnsuMCF6l2iPjAR/ag3JnC6a2oRD9
kAu9HIW1YcSq4A82QqAASb9Q9eVspYtAPfqo9iZh02xI2xGgQgLeRt7VhF1j3NV2
NKmUCSrEqQ1Vd9rHZf8IkyDdp1KeujiHZZdOCsrLBFRUcfRykJZYJgwD6M3fxyGe
tId24HJy5KP4K35RDHdH3NMI+6xSuAGMARKqZRo/ZPgG5HmPi535CYqCSuznsw2/
GlV8y2pIALZlqsTuS+299oL1jg8ChZ3xxTYdu7wwkYS3n23iRy8+ZNW26xeZyEud
ArWJtVubTfvOLjRXWG0ZhE1wvlqarLn9mbWLq07FsuaKZnSBeiEX8uKdx44aLVEH
tjlkn3BZ57ChARXmcyNWKmpehiXsfbt3qzJfShMNL3bBkcvbHlrUUiGcxJitJGkO
3lF+jLk+mizu5ckEdJalyNhwcx7D3y/t95T5P6Yp0EtRF5bT+qTNes3L2Uj/ciXo
eUOUNlnh+UsURgIS1p1YcQCQPJsOHsLkJIfSRv4RRn2wqToP/zIsPHcjTGcLRikN
xTASXf4XzpxrpXj8LobMkecBYePSZg==
=R55U
-----END PGP SIGNATURE-----


Reply to: