-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Sun, 26 Jul 2020 15:21:41 +0000 Source: chromium Architecture: source Version: 84.0.4147.89-1 Distribution: experimental Urgency: medium Maintainer: Debian Chromium Team <chromium@packages.debian.org> Changed-By: Michael Gilbert <mgilbert@debian.org> Changes: chromium (84.0.4147.89-1) experimental; urgency=medium . * New upstream stable release. - CVE-2020-6510: Heap buffer overflow in background fetch. Reported by Leecraso and Guang Gong - CVE-2020-6511: Side-channel information leakage in content security policy. Reported by Mikhail Oblozhikhin - CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu - CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar Nikolic - CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by Natalie Silvanovich - CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA - CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang and Aryb1n - CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu - CVE-2020-6518: Use after free in developer tools. Reported by David Erceg - CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman - CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou - CVE-2020-6521: Side-channel information leakage in autofill. Reported by Xu Lin, Panagiotis Ilia, Jason Polakis - CVE-2020-6522: Inappropriate implementation in external protocol handlers. Reported by Eric Lawrence - CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu Zekai - CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta - CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou - CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported by Jonathan Kingston - CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong Zhaochen - CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan Bijoora - CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by kaustubhvats7 - CVE-2020-6530: Out of bounds memory access in developer tools. Reported by myvyang - CVE-2020-6531: Side-channel information leakage in scroll to text. Reported by Jun Kokatsu - CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen - CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous - CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun Kokatsu - CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng * Update information in debian/copyright. * Include more upstream metadata information. Checksums-Sha1: 0c968cc3f52901ca5d4d558e9255ce4e1f0a821a 4294 chromium_84.0.4147.89-1.dsc 920f2f2daa7741149ad22ceb086c9e2d6cb739c5 336746252 chromium_84.0.4147.89.orig.tar.xz 257d8fc8f0e8037463b50e18d58265aa32f4dd72 163024 chromium_84.0.4147.89-1.debian.tar.xz 8173fe93df4e4a16e3ef11be940bfe20161b4ba0 21790 chromium_84.0.4147.89-1_source.buildinfo Checksums-Sha256: 81edc4997c83a527e916b65f2a24e88d49b1814734cb3ccf5a75bfa31576d6c8 4294 chromium_84.0.4147.89-1.dsc ac540d43c8640db1e06072c7d46d4c7f7f9834e9981617fa5ce7dd20256a53f0 336746252 chromium_84.0.4147.89.orig.tar.xz 9bbe216de3ae147e2451adf8a43aec2039d80afd33b30dfd10246ae02fd67d78 163024 chromium_84.0.4147.89-1.debian.tar.xz 4c1436453102e581d9117cd7743c13b928cdfbc33aa77a7957a95ddf5114607c 21790 chromium_84.0.4147.89-1_source.buildinfo Files: c577a6b6cc2158d6543b2813c5c607f8 4294 web optional chromium_84.0.4147.89-1.dsc c24af82c005132578048a01c12b79671 336746252 web optional chromium_84.0.4147.89.orig.tar.xz 4a19708eb612b77ae04dcf09782ecd4c 163024 web optional chromium_84.0.4147.89-1.debian.tar.xz dbb45611b3821aad911f1b9d8615553f 21790 web optional chromium_84.0.4147.89-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQQzBAEBCgAdFiEEIwTlZiOEpzUxIyp4mD40ZYkUaygFAl8d1dAACgkQmD40ZYkU ayhkrh/+MSQg+W1OZzOaWPdKMl3kmAXERrzo1fzsTWiidWJ50F/J761CZ8hJkg00 QIj06RzflFpZRU86CfkT2X3o0QTGcyqcaopb3qbasluX5fP92DxlM4dnkwuY1SL8 BFOGEB/qZRPhkFtW9pfDFmA3F8cV+mvKX4+joL1/hCVkxeP8z76yQY39mDH7Blsx HeBBFukjfSTeIxNz4wSyDcNZdYzDoCInCgG4S9WbSljUMX9PyqAqjq/kX8iZ+1/O jMPdN2muScNYzorswvw08Ci5f6j6k3g1FTutetK33l1EY4eo3+J0KtanC/Jj3+p+ rk7PihErSh0/jvw1eKHdrc7FyDYdPBdqCwl131xO2RV2mazBVS/2yie5uwPUGyCU 2QprOroHwoRbCC07BGGR4Rc/AKQjf6TORR/6Xf59m773XQcmPKgRO5+iALVZf6jL +a4do6PqBZTqXk1QXI+PlnoIQTu7WRnQXlkawHvkZLF/xtbleB/ha0qiKAM2xRsf AMQQc7aof3cGyruno8fNJWOFq087cQF6pV2qm1sUWwgZu7AjNcSzzQRZMHrmR/so QBG+zHs4hfw1PZhaQDg6TC5r+zhZNgGo4rE+/TMKOn2R/h+68e2/QL1T+XAOx2nL l7yslEK020iio7xOruvXfctqaUysn+G3Rot9265jlvllloOJ1LKx/8ud2/SnNmsJ 3elxkENBdQW6GRxvj795DZIuFsAtoL8VvWUI4O1tkw7HwDCcMNgmTrA9E7nIQvq4 XN7Ih7bF087EKRmkzikYWjrAABISpueHA+aOdxczU7sHFnEPXGvNBuprPS90dQEV IeJCocB6oWIQh+PYEY4GMI9NafLlFDAtnKSeiFaPDx1LoLnRAUSOqkc8QjM9a0c+ EK3LQ+UNFN/yrdTAYVbzNaVFCjmpemAfLCL8hmxbJG6G7iW9XIw5K7M155eMDSUq Gz6a+7t/Yr4Fc7dYw4KDirroOkh/iwpFAv002EXiQRIltQdd23RqSfhr7vDxw1ZV 3zeSfqQpbGLqbZ7uf89A7s/AyH5qilhTjfTu/A+65mSwyYIrfjAOE86lPXyy2WiR jWJAfzvDOUPAFXKkqNUfeuU/NQGLXwNOdBvVwhHkFHzTBqLsn0R4tM15E5Yq9cSd DrBt491D+25rlVVVMgEoMuBFhR8Ka0nPOoq9U7R457hfp22Jvaf3TQnWBY3xEu2R rkkguIzOUFPAkJN6WqyqVuStj7DZm3u2+5kGu2VgT1vOPYApYDM8P5+rpr8jm2QI kkkWGi1dZTaAHP/63+S/VQdB6n6Zfqtqq3etHdKp6T0/g1xrWAs5jC5Z7cZVfLEG 2IUhcNRjH1r16aM6yNoLKoQYlHeVeA== =2Tet -----END PGP SIGNATURE-----