From: QA Team Robot <qa@altlinux.org> To: sisyphus-cybertalk@lists.altlinux.org Subject: [cyber] I: p10/branch packages: +1 (18941) Date: Fri, 6 Sep 2024 00:19:05 +0000 Message-ID: <ZtpKeR9IGNWYA6Qc@beehive.mskdc.altlinux.org> (raw) 1 UPDATED package chromium - An open source web browser developed by Google [2893M] * Sat Jul 20 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.182-alt0.p10.1 - Backport new version to p10 branch. - Use LLVM 17.0 and libstdc++ from gcc13. * Wed Jul 17 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.182-alt1 - New version (126.0.6478.182). - Security fixes: + CVE-2024-6772: Inappropriate implementation in V8. + CVE-2024-6773: Type Confusion in V8. + CVE-2024-6774: Use after free in Screen Capture. + CVE-2024-6775: Use after free in Media Stream. + CVE-2024-6776: Use after free in Audio. + CVE-2024-6777: Use after free in Navigation. + CVE-2024-6778: Race in DevTools. + CVE-2024-6779: Out of bounds memory access in V8. * Thu Jun 27 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.126-alt1 - New version (126.0.6478.126). - Security fixes: + CVE-2024-6290: Use after free in Dawn. + CVE-2024-6291: Use after free in Swiftshader. + CVE-2024-6292: Use after free in Dawn. + CVE-2024-6293: Use after free in Dawn. * Sat Jun 22 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.114-alt1 - New version (126.0.6478.114). - Security fixes: + CVE-2024-6100: Type Confusion in V8. + CVE-2024-6101: Inappropriate implementation in WebAssembly. + CVE-2024-6102: Out of bounds memory access in Dawn. + CVE-2024-6103: Use after free in Dawn. * Sat Jun 15 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.61-alt1 - New version (126.0.6478.61). * Thu Jun 13 2024 Andrey Cherepanov <cas@altlinux> 126.0.6478.55-alt1 - New version (126.0.6478.55) (ALT #50621). - Security fixes: + CVE-2024-5830: Type Confusion in V8. + CVE-2024-5831: Use after free in Dawn. + CVE-2024-5832: Use after free in Dawn. + CVE-2024-5833: Type Confusion in V8. + CVE-2024-5834: Inappropriate implementation in Dawn. + CVE-2024-5835: Heap buffer overflow in Tab Groups. + CVE-2024-5836: Inappropriate Implementation in DevTools. + CVE-2024-5837: Type Confusion in V8. + CVE-2024-5838: Type Confusion in V8. + CVE-2024-5839: Inappropriate Implementation in Memory Allocator. + CVE-2024-5840: Policy Bypass in CORS. + CVE-2024-5841: Use after free in V8. + CVE-2024-5842: Use after free in Browser UI. + CVE-2024-5843: Inappropriate implementation in Downloads. + CVE-2024-5844: Heap buffer overflow in Tab Strip. + CVE-2024-5845: Use after free in Audio. + CVE-2024-5846: Use after free in PDFium. + CVE-2024-5847: Use after free in PDFium. * Fri May 31 2024 Andrey Cherepanov <cas@altlinux> 125.0.6422.141-alt1 - New version (125.0.6422.141). - Security fixes: + CVE-2024-5493: Heap buffer overflow in WebRTC. + CVE-2024-5494: Use after free in Dawn. + CVE-2024-5495: Use after free in Dawn. + CVE-2024-5496: Use after free in Media Session. + CVE-2024-5497: Out of bounds memory access in Keyboard Inputs. + CVE-2024-5498: Use after free in Presentation API. + CVE-2024-5499: Out of bounds write in Streams API. * Sat May 25 2024 Andrey Cherepanov <cas@altlinux> 125.0.6422.112-alt1 - New version (125.0.6422.112). - Security fixes: + CVE-2024-5274: Type Confusion in V8. * Wed May 22 2024 Andrey Cherepanov <cas@altlinux> 125.0.6422.76-alt1 - New version (125.0.6422.76). - Security fixes: + CVE-2024-5157: Use after free in Scheduling. + CVE-2024-5158: Type Confusion in V8. + CVE-2024-5159: Heap buffer overflow in ANGLE. + CVE-2024-5160: Heap buffer overflow in Dawn. * Sat May 18 2024 Andrey Cherepanov <cas@altlinux> 125.0.6422.60-alt1 - New version (125.0.6422.60). - Security fixes: + CVE-2024-4947: Type Confusion in V8. + CVE-2024-4948: Use after free in Dawn. + CVE-2024-4949: Use after free in V8. + CVE-2024-4950: Inappropriate implementation in Downloads. - Apply patches from Debian to fix webpage hangs. * Tue May 14 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.207-alt1 - New version (124.0.6367.207). - Security fixes: + CVE-2024-4761: Out of bounds write in V8. * Sun May 12 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.201-alt1 - New version (124.0.6367.201). - Security fixes: + CVE-2024-4671: Use after free in Visuals. * Thu May 09 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.155-alt1 - New version (124.0.6367.155). - Security fixes: + CVE-2024-4558: Use after free in ANGLE. + CVE-2024-4559: Heap buffer overflow in WebAudio. - Built using LLVM 18.1. * Wed May 01 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.118-alt1 - New version (124.0.6367.118). - Security fixes: + CVE-2024-4331: Use after free in Picture In Picture. + CVE-2024-4368: Use after free in Dawn. * Thu Apr 25 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.78-alt1 - New version (124.0.6367.78). - Security fixes: + CVE-2024-4058: Type Confusion in ANGLE. + CVE-2024-4059: Out of bounds read in V8 API. + CVE-2024-4060: Use after free in Dawn. * Sat Apr 20 2024 Andrey Cherepanov <cas@altlinux> 124.0.6367.60-alt1 - New version (124.0.6367.60). - Security fixes: + CVE-2024-3832: Object corruption in V8. + CVE-2024-3833: Object corruption in WebAssembly. + CVE-2024-3914: Use after free in V8. + CVE-2024-3834: Use after free in Downloads. + CVE-2024-3837: Use after free in QUIC. + CVE-2024-3838: Inappropriate implementation in Autofill. + CVE-2024-3839: Out of bounds read in Fonts. + CVE-2024-3840: Insufficient policy enforcement in Site Isolation. + CVE-2024-3841: Insufficient data validation in Browser Switcher. + CVE-2024-3843: Insufficient data validation in Downloads. + CVE-2024-3844: Inappropriate implementation in Extensions. + CVE-2024-3845: Inappropriate implementation in Network. + CVE-2024-3846: Inappropriate implementation in Prompts. + CVE-2024-3847: Insufficient policy enforcement in WebUI. * Sat Apr 13 2024 Andrey Cherepanov <cas@altlinux> 123.0.6312.122-alt1 - New version (123.0.6312.122). - Security fixes: + CVE-2024-3157: Out of bounds write in Compositing. + CVE-2024-3516: Heap buffer overflow in ANGLE. + CVE-2024-3515: Use after free in Dawn. - Use vaapi flags from Fedora defaults. * Wed Mar 27 2024 Andrey Cherepanov <cas@altlinux> 123.0.6312.86-alt1 - New version (123.0.6312.86). - Security fixes: + CVE-2024-2883: Use after free in ANGLE. + CVE-2024-2885: Use after free in Daw. + CVE-2024-2886: Use after free in WebCodecs. + CVE-2024-2887: Type Confusion in WebAssembly. * Thu Mar 21 2024 Alexey Gladkov <legion@altlinux> 123.0.6312.58-alt1 - New version (123.0.6312.58). - Security fixes: - CVE-2024-2173: Out of bounds memory access in V8. - CVE-2024-2174: Inappropriate implementation in V8. - CVE-2024-2176: Use after free in FedCM. - CVE-2024-2400: Use after free in Performance Manager. - CVE-2024-2625: Object lifecycle issue in V8. - CVE-2024-2626: Out of bounds read in Swiftshader. - CVE-2024-2627: Use after free in Canvas. - CVE-2024-2628: Inappropriate implementation in Downloads. - CVE-2024-2629: Incorrect security UI in iOS. - CVE-2024-2630: Inappropriate implementation in iOS. - CVE-2024-2631: Inappropriate implementation in iOS. * Wed Feb 28 2024 Alexey Gladkov <legion@altlinux> 122.0.6261.94-alt1 - New version (122.0.6261.94). - Security fixes: - CVE-2024-1669: Out of bounds memory access in Blink. - CVE-2024-1670: Use after free in Mojo. - CVE-2024-1671: Inappropriate implementation in Site Isolation. - CVE-2024-1672: Inappropriate implementation in Content Security Policy. - CVE-2024-1673: Use after free in Accessibility. - CVE-2024-1674: Inappropriate implementation in Navigation. - CVE-2024-1675: Insufficient policy enforcement in Download. - CVE-2024-1676: Inappropriate implementation in Navigation. - CVE-2024-1938: Type Confusion in V8. - CVE-2024-1939: Type Confusion in V8. * Thu Feb 08 2024 Alexey Gladkov <legion@altlinux> 121.0.6167.160-alt1 - New version (121.0.6167.160). - Security fixes: - CVE-2024-1283: Heap buffer overflow in Skia. - CVE-2024-1284: Use after free in Mojo. * Thu Feb 08 2024 Alexey Gladkov <legion@altlinux> 121.0.6167.139-alt1 - New version (121.0.6167.139). - Security fixes: - CVE-2024-1059: Use after free in WebRTC. - CVE-2024-1060: Use after free in Canvas. - CVE-2024-1077: Use after free in Network. * Wed Jan 24 2024 Alexey Gladkov <legion@altlinux> 121.0.6167.85-alt1 - New version (121.0.6167.85). - Security fixes: - CVE-2024-0804: Insufficient policy enforcement in iOS Security UI. - CVE-2024-0805: Inappropriate implementation in Downloads. - CVE-2024-0806: Use after free in Passwords. - CVE-2024-0807: Use after free in WebAudio. - CVE-2024-0808: Integer underflow in WebUI. - CVE-2024-0809: Inappropriate implementation in Autofill. - CVE-2024-0810: Insufficient policy enforcement in DevTools. - CVE-2024-0811: Inappropriate implementation in Extensions API. - CVE-2024-0812: Inappropriate implementation in Accessibility. - CVE-2024-0813: Use after free in Reading Mode. - CVE-2024-0814: Incorrect security UI in Payments. * Tue Dec 26 2023 Andrey Cherepanov <cas@altlinux> 120.0.6099.109-alt1.p10.1 - Backport new version to p10 branch. * Mon Dec 18 2023 Alexey Gladkov <legion@altlinux> 120.0.6099.109-alt2 - Bring back optimization flags. * Sat Dec 16 2023 Alexey Gladkov <legion@altlinux> 120.0.6099.109-alt1 - New version (120.0.6099.109). - Security fixes: - CVE-2023-6702: Type Confusion in V8. - CVE-2023-6703: Use after free in Blink. - CVE-2023-6704: Use after free in libavif. - CVE-2023-6705: Use after free in WebRTC. - CVE-2023-6706: Use after free in FedCM. - CVE-2023-6707: Use after free in CSS. * Thu Dec 07 2023 Alexey Gladkov <legion@altlinux> 120.0.6099.71-alt1 - New version (120.0.6099.71). * Thu Nov 23 2023 Andrey Cherepanov <cas@altlinux> 119.0.6045.159-alt0.p10.1 Total 18941 source packages.
reply other threads:[~2024-09-06 0:19 UTC|newest] Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=ZtpKeR9IGNWYA6Qc@beehive.mskdc.altlinux.org \ --to=qa@altlinux.org \ --cc=devel@lists.altlinux.org \ --cc=sisyphus-cybertalk@lists.altlinux.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
ALT Linux Sisyphus cybertalk This inbox may be cloned and mirrored by anyone: git clone --mirror http://lore.altlinux.org/sisyphus-cybertalk/0 sisyphus-cybertalk/git/0.git # If you have public-inbox 1.1+ installed, you may # initialize and index your mirror using the following commands: public-inbox-init -V2 sisyphus-cybertalk sisyphus-cybertalk/ http://lore.altlinux.org/sisyphus-cybertalk \ sisyphus-cybertalk@lists.altlinux.org sisyphus-cybertalk@lists.altlinux.ru sisyphus-cybertalk@lists.altlinux.com public-inbox-index sisyphus-cybertalk Example config snippet for mirrors. Newsgroup available over NNTP: nntp://lore.altlinux.org/org.altlinux.lists.sisyphus-cybertalk AGPL code for this site: git clone https://public-inbox.org/public-inbox.git