Debian Package Tracker
Register | Log in
Subscribe

libskia

Choose email to subscribe with

general
  • source: libskia (main)
  • version: 146.20260311+dfsg-4
  • maintainer: Filip Strömbäck (DMD)
  • arch: any
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • testing: 146.20260311+dfsg-4
  • unstable: 146.20260311+dfsg-4
versioned links
  • 146.20260311+dfsg-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libskia-dev
  • libskia146
action needed
Problems while searching for a new upstream version high
uscan had problems while searching for a new upstream version:
Untrackable project: Upstream does not track version numbers on milestone branches.
Created: 2026-03-29 Last update: 2026-04-16 06:30
4 security issues in sid high

There are 4 open security issues in sid.

4 important issues:
  • CVE-2026-5870: Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-6298: Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)
  • CVE-2026-6364: Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted file. (Chromium security severity: Medium)
  • CVE-2025-32318: In Skia, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Created: 2026-03-29 Last update: 2026-04-16 06:01
4 security issues in forky high

There are 4 open security issues in forky.

4 important issues:
  • CVE-2026-5870: Integer overflow in Skia in Google Chrome prior to 147.0.7727.55 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
  • CVE-2026-6298: Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Critical)
  • CVE-2026-6364: Out of bounds read in Skia in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted file. (Chromium security severity: Medium)
  • CVE-2025-32318: In Skia, there is a possible out of bounds write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Created: 2026-04-06 Last update: 2026-04-16 06:01
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.3).
Created: 2026-03-31 Last update: 2026-04-01 04:31
news
[rss feed]
  • [2026-04-06] libskia 146.20260311+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2026-03-31] Accepted libskia 146.20260311+dfsg-4 (source) into unstable (Filip Strömbäck)
  • [2026-03-30] Accepted libskia 146.20260311+dfsg-3 (source) into unstable (Filip Strömbäck)
  • [2026-03-30] Accepted libskia 146.20260311+dfsg-2 (source) into unstable (Filip Strömbäck)
  • [2026-03-29] Accepted libskia 146.20260311+dfsg-1 (source amd64) into unstable (Debian FTP Masters) (signed by: Filip Strömbäck)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 146.20260311+dfsg-4ubuntu1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing