chromium 103.0.5060.134-1 source package in Debian

Changelog

chromium (103.0.5060.134-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-2477 : Use after free in Guest View. Reported by anonymous
    - CVE-2022-2478 : Use after free in PDF. Reported by triplepwns
    - CVE-2022-2479 : Insufficient validation of untrusted input in File.
      Reported by anonymous
    - CVE-2022-2480 : Use after free in Service Worker API.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2022-2481: Use after free in Views. Reported by
      YoungJoo Lee(@ashuu_lee) of CompSecLab at Seoul National University
    - CVE-2022-2163: Use after free in Cast UI and Toolbar.
      Reported by Chaoyuan Peng (@ret2happy)

 -- Andres Salomon <email address hidden>  Wed, 20 Jul 2022 00:51:39 -0400

Upload details

Uploaded by:
Debian Chromium Team
Uploaded to:
Sid
Original maintainer:
Debian Chromium Team
Architectures:
i386 amd64 arm64 armhf all
Section:
misc
Urgency:
Very Urgent

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
chromium_103.0.5060.134-1.dsc 3.5 KiB c8425e40a1a6ea86c48fd18d83a45a386a98294301130f46acd559f8a21b5ac4
chromium_103.0.5060.134.orig.tar.xz 580.2 MiB 650293caca0f3e0a7fc5dd1b2ced543f3224367bc10e926d624c335a95393f3e
chromium_103.0.5060.134-1.debian.tar.xz 204.5 KiB 7d5790d8fe43a04f9093f80442d9abcb2ee7039bbae39132bf31e0b768163d31

No changes file available.

Binary packages built by this source