Debian Package Tracker
Register | Log in
Subscribe

chromium

Choose email to subscribe with

general
  • source: chromium (main)
  • version: 145.0.7632.109-1
  • maintainer: Debian Chromium Team (DMD)
  • uploaders: Andres Salomon [DMD] – Daniel Richard G. [DMD] – Timothy Pearson [DMD]
  • arch: all amd64 arm64 armhf i386 ppc64el
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 120.0.6099.224-1~deb11u1
  • o-o-sec: 120.0.6099.224-1~deb11u1
  • oldstable: 143.0.7499.169-1~deb12u1
  • old-sec: 145.0.7632.75-1~deb12u1
  • old-p-u: 144.0.7559.109-2~deb12u1
  • stable: 143.0.7499.169-1~deb13u1
  • stable-sec: 145.0.7632.75-1~deb13u1
  • stable-p-u: 144.0.7559.109-1~deb13u1
  • testing: 144.0.7559.109-2
  • unstable: 145.0.7632.109-1
versioned links
  • 120.0.6099.224-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 143.0.7499.169-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 143.0.7499.169-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 144.0.7559.109-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 144.0.7559.109-2~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 144.0.7559.109-2~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 144.0.7559.109-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 145.0.7632.75-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 145.0.7632.75-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 145.0.7632.75-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 145.0.7632.109-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • chromium (69 bugs: 1, 38, 30, 0)
  • chromium-common
  • chromium-driver
  • chromium-headless-shell
  • chromium-l10n
  • chromium-sandbox
  • chromium-shell
action needed
3 security issues in trixie high

There are 3 open security issues in trixie.

3 important issues:
  • CVE-2026-2648: Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-2649: Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2650: Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-02-19 Last update: 2026-02-19 13:00
15 security issues in forky high

There are 15 open security issues in forky.

15 important issues:
  • CVE-2026-2313: Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2314: Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2315: Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2316: Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-2317: Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-2318: Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-2319: Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)
  • CVE-2026-2320: Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-2321: Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-2322: Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
  • CVE-2026-2323: Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
  • CVE-2026-2441: Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2648: Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-2649: Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2650: Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-02-11 Last update: 2026-02-19 13:00
3 security issues in bookworm high

There are 3 open security issues in bookworm.

3 important issues:
  • CVE-2026-2648: Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-2649: Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-2650: Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-02-19 Last update: 2026-02-19 13:00
lintian reports 4 errors and 2968 warnings high
Lintian reports 4 errors and 2968 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-02-05 Last update: 2026-02-19 11:30
3 new commits since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit f97620bdc107574fab4208381c879bb92797e1fd
Author: Andres Salomon <dilinger@queued.net>
Date:   Wed Feb 18 16:23:04 2026 -0500

    release 145.0.7632.109-1

commit 5a07797bb1fe019bcfee5069b8d6a9ae53a5a9c3
Author: Andres Salomon <dilinger@queued.net>
Date:   Sat Feb 14 04:55:00 2026 -0500

    fix arm64 build failures on bookworm/trixie
    
    Mark a bunch of neon-related functions as unsafe, as we had to do for
    x86 simd functions.

commit dc675a1fb058dc78e9d9f3d091c859058d2d65fa
Author: Daniel Richard G. <skunk@iSKUNK.ORG>
Date:   Fri Feb 13 20:26:15 2026 -0500

    Sync jxl-simd-avx512.patch from trixie
Created: 2026-02-16 Last update: 2026-02-19 20:31
4 bugs tagged help in the BTS normal
The BTS contains 4 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2019-03-21 Last update: 2026-02-19 20:00
8 bugs tagged patch in the BTS normal
The BTS contains patches fixing 8 bugs, consider including or untagging them.
Created: 2025-01-06 Last update: 2026-02-19 20:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2026-02-11 Last update: 2026-02-19 16:31
2 open merge requests in Salsa normal
There are 2 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-09-18 Last update: 2026-02-19 04:01
RFH: The maintainer is looking for help with this package. normal
The current maintainer is looking for someone who can help with the maintenance of this package. If you are interested in this package, please consider helping out. One way you can help is offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #1016047 for more information.
Created: 2022-07-26 Last update: 2022-07-26 03:32
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • chromium: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:12
debian/patches: 123 patches to forward upstream low

Among the 126 debian patches available in version 145.0.7632.109-1 of the package, we noticed the following issues:

  • 123 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-02-19 16:32
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.3 instead of 4.5.0).
Created: 2020-11-17 Last update: 2026-02-19 14:02
testing migrations
  • excuses:
    • Migration status for chromium (144.0.7559.109-2 to 145.0.7632.109-1): BLOCKED: Maybe temporary, maybe blocked but Britney is missing information (check below)
    • Issues preventing migration:
    • ∙ ∙ Missing build on amd64
    • ∙ ∙ Missing build on arm64
    • ∙ ∙ Missing build on armhf
    • ∙ ∙ Missing build on i386
    • ∙ ∙ Missing build on ppc64el
    • ∙ ∙ Autopkgtest deferred on amd64: missing arch:amd64 build
    • ∙ ∙ Autopkgtest deferred on arm64: missing arch:arm64 build
    • ∙ ∙ Autopkgtest deferred on i386: missing arch:i386 build
    • ∙ ∙ Autopkgtest deferred on ppc64el: missing arch:ppc64el build
    • ∙ ∙ Lintian check waiting for test results on i386, arm64, ppc64el, amd64, armhf - info
    • ∙ ∙ Reproducibility check deferred on amd64: missing builds
    • ∙ ∙ Reproducibility check deferred on arm64: missing builds
    • ∙ ∙ Reproducibility check deferred on armhf: missing builds
    • ∙ ∙ Reproducibility check deferred on i386: missing builds
    • ∙ ∙ Reproducibility check deferred on ppc64el: missing builds
    • ∙ ∙ Too young, only 1 of 2 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/c/chromium.html
    • ∙ ∙ Autopkgtest skipped on riscv64: not installable (which is allowed)
    • ∙ ∙ Autopkgtest skipped on s390x: not installable (which is allowed)
    • Not considered
news
[rss feed]
  • [2026-02-19] Accepted chromium 145.0.7632.109-1 (source) into unstable (Andres Salomon)
  • [2026-02-15] Accepted chromium 145.0.7632.75-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-02-15] Accepted chromium 145.0.7632.75-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-02-14] Accepted chromium 145.0.7632.75-1 (source) into unstable (Andres Salomon)
  • [2026-02-13] Accepted chromium 145.0.7632.45-1 (source) into unstable (Andres Salomon)
  • [2026-02-08] Accepted chromium 144.0.7559.109-2~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-02-08] chromium 144.0.7559.109-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-05] Accepted chromium 144.0.7559.109-2~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-02-05] Accepted chromium 144.0.7559.109-2~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-02-05] Accepted chromium 144.0.7559.109-2 (source) into unstable (Andres Salomon)
  • [2026-01-31] Accepted chromium 144.0.7559.109-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-31] Accepted chromium 144.0.7559.109-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-31] chromium 144.0.7559.109-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-30] Accepted chromium 144.0.7559.109-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-30] Accepted chromium 144.0.7559.109-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-29] Accepted chromium 144.0.7559.109-1 (source) into unstable (Andres Salomon)
  • [2026-01-24] Accepted chromium 144.0.7559.96-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-24] Accepted chromium 144.0.7559.59-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-24] Accepted chromium 144.0.7559.96-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-24] Accepted chromium 144.0.7559.59-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-24] chromium 144.0.7559.96-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-22] Accepted chromium 144.0.7559.96-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-22] Accepted chromium 144.0.7559.96-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-21] Accepted chromium 144.0.7559.96-1 (source) into unstable (Andres Salomon)
  • [2026-01-17] chromium 144.0.7559.59-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-15] Accepted chromium 144.0.7559.59-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-15] Accepted chromium 144.0.7559.59-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-14] Accepted chromium 144.0.7559.59-1 (source) into unstable (Andres Salomon)
  • [2026-01-10] Accepted chromium 143.0.7499.192-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-01-10] Accepted chromium 143.0.7499.192-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • 1
  • 2
bugs [bug history graph]
  • all: 79 85
  • RC: 1
  • I&N: 40 42
  • M&W: 38 42
  • F&P: 0
  • patch: 8
  • help: 4
links
  • homepage
  • lintian (4, 2968)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing