Debian Package Tracker
Register | Log in
Subscribe

chromium

web browser

Choose email to subscribe with

general
  • source: chromium (main)
  • version: 146.0.7680.177-1
  • maintainer: Debian Chromium Team (DMD)
  • uploaders: Andres Salomon [DMD] – Timothy Pearson [DMD] – Daniel Richard G. [DMD]
  • arch: all amd64 arm64 armhf i386 ppc64el
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 120.0.6099.224-1~deb11u1
  • o-o-sec: 120.0.6099.224-1~deb11u1
  • oldstable: 143.0.7499.169-1~deb12u1
  • old-sec: 146.0.7680.164-1~deb12u1
  • old-p-u: 146.0.7680.153-1~deb12u1
  • stable: 145.0.7632.159-1~deb13u1
  • stable-sec: 146.0.7680.164-1~deb13u1
  • stable-p-u: 146.0.7680.153-1~deb13u1
  • testing: 146.0.7680.153-1
  • unstable: 146.0.7680.177-1
versioned links
  • 120.0.6099.224-1~deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 143.0.7499.169-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 145.0.7632.159-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.153-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.153-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.153-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.164-1~deb12u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.164-1~deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 146.0.7680.177-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • chromium (68 bugs: 1, 38, 29, 0)
  • chromium-common
  • chromium-driver
  • chromium-headless-shell
  • chromium-l10n
  • chromium-sandbox
  • chromium-shell
action needed
lintian reports 13 errors and 2989 warnings high
Lintian reports 13 errors and 2989 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-03-25 Last update: 2026-04-02 18:01
21 security issues in trixie high

There are 21 open security issues in trixie.

21 important issues:
  • CVE-2026-5272: Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5273: Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5274: Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5275: Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5276: Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5277: Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5278: Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5279: Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5280: Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5281: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5282: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5283: Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5284: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5285: Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5286: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5287: Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-5288: Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5289: Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5290: Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5291: Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-5292: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-04-01 Last update: 2026-04-02 04:32
29 security issues in forky high

There are 29 open security issues in forky.

29 important issues:
  • CVE-2026-4673: Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4674: Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4675: Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4676: Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4677: Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4678: Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4679: Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-4680: Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5272: Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5273: Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5274: Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5275: Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5276: Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5277: Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5278: Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5279: Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5280: Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5281: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5282: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5283: Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5284: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5285: Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5286: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5287: Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-5288: Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5289: Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5290: Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5291: Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-5292: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-03-24 Last update: 2026-04-02 04:32
21 security issues in bookworm high

There are 21 open security issues in bookworm.

21 important issues:
  • CVE-2026-5272: Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5273: Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5274: Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5275: Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5276: Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5277: Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5278: Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5279: Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5280: Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5281: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5282: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5283: Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5284: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5285: Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5286: Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5287: Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
  • CVE-2026-5288: Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5289: Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5290: Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-5291: Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
  • CVE-2026-5292: Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Created: 2026-04-01 Last update: 2026-04-02 04:32
4 bugs tagged help in the BTS normal
The BTS contains 4 bugs tagged help, please consider helping the maintainer in dealing with them.
Created: 2019-03-21 Last update: 2026-04-03 01:00
7 bugs tagged patch in the BTS normal
The BTS contains patches fixing 7 bugs, consider including or untagging them.
Created: 2026-03-31 Last update: 2026-04-03 01:00
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2026-03-13 Last update: 2026-04-02 22:31
2 open merge requests in Salsa normal
There are 2 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2026-03-08 Last update: 2026-03-08 14:02
RFH: The maintainer is looking for help with this package. normal
The current maintainer is looking for someone who can help with the maintenance of this package. If you are interested in this package, please consider helping out. One way you can help is offer to be a co-maintainer or triage bugs in the BTS. Please see bug number #1016047 for more information.
Created: 2022-07-26 Last update: 2022-07-26 03:32
AppStream hints: 1 warning normal
AppStream found metadata issues for packages:
  • chromium: 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2020-06-01 Last update: 2020-06-01 01:12
debian/patches: 134 patches to forward upstream low

Among the 137 debian patches available in version 146.0.7680.177-1 of the package, we noticed the following issues:

  • 134 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-02 09:33
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.5.0).
Created: 2020-11-17 Last update: 2026-04-01 22:30
testing migrations
  • excuses:
    • Migration status for chromium (146.0.7680.153-1 to 146.0.7680.177-1): Waiting for test results or another package, or too young (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Autopkgtest for dbus-glib/0.114-2: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for dmarc-srg/3.0~pre1-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for dnstwist/0~20250130-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for gimp/3.2.0-1: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻ (reference ♻), ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for jquery-timepicker/1.6.3-6: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for libwwwbrowser-perl/2.23-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for nghttp2/1.68.1-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for node-jquery-validation/1.21.0+dfsg-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for node-nouislider/15.8.1+ds-2: amd64: No tests, superficial or marked flaky ♻, arm64: No tests, superficial or marked flaky ♻, i386: No tests, superficial or marked flaky ♻, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for phpldapadmin/1.2.6.7-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for phpsysinfo/3.4.4-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for pysatellites/2.7-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for python-selenium/4.24.4+dfsg-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for qunit-selenium/0.0.4-2: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for sabnzbdplus/4.5.4+dfsg-4: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Autopkgtest for slm/2.12-1: amd64: Pass, arm64: Pass, i386: Pass, ppc64el: Test triggered
    • ∙ ∙ Too young, only 1 of 2 days old
    • Additional info (not blocking):
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/c/chromium.html
    • ∙ ∙ Autopkgtest skipped on riscv64: not installable (which is allowed)
    • ∙ ∙ Autopkgtest skipped on s390x: not installable (which is allowed)
    • ∙ ∙ Reproducibility check waiting for results on amd64
    • ∙ ∙ Reproducibility check waiting for results on arm64
    • ∙ ∙ Reproducibility check waiting for results on armhf
    • ∙ ∙ Reproducibility check waiting for results on i386
    • ∙ ∙ Reproducibility check waiting for results on ppc64el
    • Not considered
news
[rss feed]
  • [2026-04-03] Accepted chromium 146.0.7680.177-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-04-03] Accepted chromium 146.0.7680.177-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-04-01] Accepted chromium 146.0.7680.177-1 (source) into unstable (Andres Salomon)
  • [2026-03-28] Accepted chromium 146.0.7680.153-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-25] Accepted chromium 146.0.7680.164-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-25] Accepted chromium 146.0.7680.164-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-24] Accepted chromium 146.0.7680.164-1 (source) into unstable (Andres Salomon)
  • [2026-03-23] chromium 146.0.7680.153-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-22] Accepted chromium 146.0.7680.153-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-20] Accepted chromium 146.0.7680.153-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-20] Accepted chromium 146.0.7680.153-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-20] Accepted chromium 146.0.7680.153-1 (source) into unstable (Andres Salomon)
  • [2026-03-19] Accepted chromium 146.0.7680.80-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-19] Accepted chromium 146.0.7680.71-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-19] Accepted chromium 145.0.7632.159-1~deb12u1 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-19] Accepted chromium 146.0.7680.80-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-18] chromium 146.0.7680.80-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-16] Accepted chromium 146.0.7680.80-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-16] Accepted chromium 146.0.7680.80-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-15] chromium 146.0.7680.71-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-15] Accepted chromium 146.0.7680.80-1 (source) into unstable (Andres Salomon)
  • [2026-03-14] Accepted chromium 146.0.7680.71-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-12] Accepted chromium 146.0.7680.71-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-12] Accepted chromium 146.0.7680.71-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-12] Accepted chromium 146.0.7680.71-1 (source) into unstable (Andres Salomon)
  • [2026-03-08] chromium 145.0.7632.159-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-06] Accepted chromium 145.0.7632.159-1~deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-06] Accepted chromium 145.0.7632.159-1~deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-06] Accepted chromium 145.0.7632.159-1~deb12u1 (source) into oldstable-security (Debian FTP Masters) (signed by: Andres Salomon)
  • [2026-03-05] Accepted chromium 145.0.7632.159-1 (source) into unstable (Andres Salomon)
  • 1
  • 2
bugs [bug history graph]
  • all: 78 84
  • RC: 1
  • I&N: 40 42
  • M&W: 37 41
  • F&P: 0
  • patch: 7
  • help: 4
links
  • homepage
  • lintian (13, 2989)
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing