*** This bug is a security vulnerability ***

You have been subscribed to a public security bug by Leandro Cunha 
(leandrocunha526):
chromium (79.0.3945.130-1) corrects:
* New upstream security release.
    - CVE-2020-6377: Use after free in audio. Reported by Zhe Jin
    - CVE-2020-6378: Use-after-free in speech recognizer. Reported by Antti
      Levomäki and Christian Jalio
    - CVE-2020-6379: Use-after-free in speech recognizer. Reported by Guang
      Gong
    - CVE-2020-6380: Extension message verification error. Reported by Sergei
      Glazunov
    - CVE-2019-13767: Use after free in media picker. Reported by Sergei
      Glazunov
* Fix memory instrumentation singleton initialization errors caused by tracing 
patch included in the previous upload (closes: #945920 
https://www.mail-archive.com/debian-bugs-dist@lists.debian.org/msg1718620.html).
https://security-tracker.debian.org/tracker/source-package/chromium
https://metadata.ftp-master.debian.org/changelogs//main/c/chromium/chromium_79.0.3945.130-2_changelog

** Affects: chromium-browser (Ubuntu)
     Importance: Undecided
     Assignee: Leandro Cunha (leandrocunha526)
         Status: Confirmed

** Affects: chromium-browser (Debian)
     Importance: Unknown
         Status: Fix Released

-- 
Security problems 
https://bugs.launchpad.net/bugs/1860872
You received this bug notification because you are a member of Ubuntu Bugs, 
which is subscribed to the bug report.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to