-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 05 Sep 2018 00:01:50 +0000 Source: chromium-browser Binary: chromium chromium-l10n chromium-shell chromium-driver chromium-common Architecture: source Version: 69.0.3497.81-1 Distribution: unstable Urgency: medium Maintainer: Debian Chromium Team <chromium-browser@packages.debian.org> Changed-By: Michael Gilbert <mgilbert@debian.org> Description: chromium - web browser chromium-common - web browser - common resources used by the chromium packages chromium-driver - web browser - WebDriver support chromium-l10n - web browser - language packs chromium-shell - web browser - minimal shell Changes: chromium-browser (69.0.3497.81-1) unstable; urgency=medium . * New upstream stable release. - CVE-2018-16065: Out of bounds write in V8. Reported by Brendon Tiszka - CVE-2018-16066: Out of bounds read in Blink. Reported by cloudfuzzer - CVE-2018-16067: Out of bounds read in WebAudio. Reported by Zhe Jin - CVE-2018-16068: Out of bounds write in Mojo. Reported by Mark Brand - CVE-2018-16069: Out of bounds read in SwiftShader. Reported by Mark Brand - CVE-2018-16070: Integer overflow in Skia. Reported by Ivan Fratric - CVE-2018-16071: Use after free in WebRTC. Reported by Natalie Silvanovich - CVE-2018-16073: Site Isolation bypass after tab restore. Reported by Jun Kokatsu - CVE-2018-16074: Site Isolation bypass using Blob URLS. Reported by Jun Kokatsu - CVE-2018-16075: Local file access in Blink. Reported by Pepe Vila - CVE-2018-16076: Out of bounds read in PDFium. Reported by Aleksandar Nikolic - CVE-2018-16077: Content security policy bypass in Blink. Reported by Manuel Caballero - CVE-2018-16078: Credit card information leak in Autofill. Reported by Cailan Sacks - CVE-2018-16079: URL spoof in permission dialogs. Reported by Markus Vervier and Michele Orrù - CVE-2018-16080: URL spoof in full screen mode. Reported by Khalil Zhani - CVE-2018-16081: Local file access in DevTools. Reported by Jann Horn - CVE-2018-16082: Stack buffer overflow in SwiftShader. Reported by Omair - CVE-2018-16083: Out of bounds read in WebRTC. Reported by Natalie Silvanovich - CVE-2018-16084: User confirmation bypass in external protocol handling. Reported by Jun Kokatsu - CVE-2018-16085: Use after free in Memory Instrumentation. Reported by Roman Kuksin Checksums-Sha1: bf55c376165bce27d62115f3fb7c7c022c801311 4198 chromium-browser_69.0.3497.81-1.dsc 0695bbc23da4160e9ce0e4dc43e1ea71ac4dbf0a 237086156 chromium-browser_69.0.3497.81.orig.tar.xz 00c5abc24ad2d213f083a8628f26de2a899ef9a4 146800 chromium-browser_69.0.3497.81-1.debian.tar.xz 0c3b629922fc538a9337b51839fc1346e707a605 19477 chromium-browser_69.0.3497.81-1_source.buildinfo Checksums-Sha256: f96189aca52237157d397288bed0ddce45b65201349285a824efbb705d715a68 4198 chromium-browser_69.0.3497.81-1.dsc 4eea1bbf8555ab56c9f93d2bde6541c30ab80d8f2d708ed39c9b0d52667658ee 237086156 chromium-browser_69.0.3497.81.orig.tar.xz 431efb81351bcb26d1676b366a409aebb19e8f2444c68683e334040f407c7842 146800 chromium-browser_69.0.3497.81-1.debian.tar.xz a85b4a52895eb92009aaaed5f9771647d93a2e87997fc6f9fdbcc40a343b0b0c 19477 chromium-browser_69.0.3497.81-1_source.buildinfo Files: fd4b74cad3657d2d22a9e9d52c8ff907 4198 web optional chromium-browser_69.0.3497.81-1.dsc 75670f17fa49b226a78391390ebca1d9 237086156 web optional chromium-browser_69.0.3497.81.orig.tar.xz e3bb2d00c242a27c3818cb4db7d37587 146800 web optional chromium-browser_69.0.3497.81-1.debian.tar.xz fa3efa69aa05cc2386686c9f9e78a77c 19477 web optional chromium-browser_69.0.3497.81-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQQzBAEBCgAdFiEEluhy7ASCBulP9FUWuNayzQLW9HMFAluPXlAACgkQuNayzQLW 9HMkIx/7BOPyPavLrznGOP5OHR5rVzn/h3ivjIpRFskJROtG6cgmGU/GC4fI13ep 2fKfJduYgKiIcSEXKaEcTmhWNFI20atSFHnCHBR8j1aDmfenOZvZNrzCCv0xz3Ev 4POe9KIEtSW+rU6LPmwmoY7PIXo9w6DF2S+aRg4KoDIS0nZfIlSKWZTZjS/FRBGZ HKpKvs7F8WlFJchDJutaAeufx6qx8Nk5zribTXFmoeNlgn8UoDDLqJj8W3ecxxl7 a/SbiVHCnbafvFxePZN8js5jKDuwyI0Twlz7lZVDjgDNzd5OZ8xNSTNSOGK3uiSu FXV77Pt0pwKH06SI0phA33wuk2Al5ovDCQEqsQMkq7qFdoDRUX8RAKyCOudg69Al amfpa5KsIRFkp9LtAcRydmugcX0gwe7XPaHn6rx1C/ZPAjQDOjXvrKZeLdQ6mXRc 70dRluq4YjqN/Nf9OX74j37BozPWY0C+l8tEUs23kAaOfRCnpp6mKTyfXp6vglhV I7bEzqACc51z5bIu8hvthYo6t2qmk9Ts1AQUrumd5T8H8dwCDSI0P87TkpzpBpT2 nNMI8WmAwBXUe42YLB1vJ0dglguG2ipdh8CVaxTvQ2HQVFUuWUtJ2NbcVOBYs9xN 5ExUO9ZLsoC2MJuBDNRotHoJZkp9qExVDdABveJDwH96WdkCaePY0oljEXhWW1Sj TP6cKd3q5Vre6EUp3r9c/JIWLfiIp0bulzv/QyWYQsWueFf72fzvS9kPnhEClwrv PwZtzaUj+lVVv9lUuwUB2tNNu/1XOZuIpSU5GKp8TYbhmkgdWhXRBo9R8L4bUNLH DaFFSgxmNZPy1d2TgnJymOkn1h7KsEU+riRtcO1jZBuLgMPpzi4CxiqJPW5kf9tC c+WOjosG6HpnSacFosTffS+/ztCEc8vuo+02m1FDSDpOfBbg/e1DwEF+Uapq2Vgz G69u/OJKKn3z4QXctd02cDcWrYEMgNq8qjnazZ53SBWw+paP/BydtXcoxlfnyxOG ZkE0KgfQInOiDuv0tzN5f/W1Ov3TuiXa49zhMuxYpvTC16trbTGpTr9kZgLM7Smc dzAw6AXgnbXHlSZQcB4TIlQiSDCJCu5pIyaMP7MPQsUAD1g9KbWV1S4HvuB0WDAZ VpYzn7RuMmOR7ZiIaHVmi9qn0WI+hWkXqd+6Nw5ouNYOsqohFTdQc93vq797kt9z oKVJ8nPkPhVowcC+qRq6VOx/gFK6equ9nnZtSYD/HOvbHd9LVlbtHqBQHI5Tri/8 gGDrxnGCOohXLXZcNyxSol7oNeo5O7t3ejfWzFQ0r8IctV9bN9MnPcuaqKCT5iQb APgQ8FXvxENK0akHO1oK7NQ0WVI+OQ== =cfAP -----END PGP SIGNATURE-----