Overview

Request 743876 accepted

chromium 78.0.3904.70 bsc#1154806:
* CVE-2019-13699: Use-after-free in media
* CVE-2019-13700: Buffer overrun in Blink
* CVE-2019-13701: URL spoof in navigation
* CVE-2019-13702: Privilege elevation in Installer
* CVE-2019-13703: URL bar spoofing
* CVE-2019-13704: CSP bypass
* CVE-2019-13705: Extension permission bypass
* CVE-2019-13706: Out-of-bounds read in PDFium
* CVE-2019-13707: File storage disclosure
* CVE-2019-13708: HTTP authentication spoof
* CVE-2019-13709: File download protection bypass
* CVE-2019-13710: File download protection bypass
* CVE-2019-13711: Cross-context information leak
* CVE-2019-15903: Buffer overflow in expat
* CVE-2019-13713: Cross-origin data leak
* CVE-2019-13714: CSS injection
* CVE-2019-13715: Address bar spoofing
* CVE-2019-13716: Service worker state error
* CVE-2019-13717: Notification obscured
* CVE-2019-13718: IDN spoof
* CVE-2019-13719: Notification obscured


Leap Reviewbot's avatar

home:AndreasStieger:branches:OBS_Maintained:chromium/chromium.openSUSE_Leap_15.0_Update@0c9f4411fd11d5cd99069f0a030ad8c0 -> openSUSE:Leap:15.0:Update/chromium

expected origin is 'openSUSE:Factory' (changed)

sr#743815 ok

found pending submission against origin (openSUSE:Factory)

home:AndreasStieger:branches:OBS_Maintained:chromium/chromium.openSUSE_Leap_15.1_Update@59a536276afcf174382b52800d5cc0d0 -> openSUSE:Leap:15.1:Update/chromium

expected origin is 'openSUSE:Leap:15.0:Update' (changed)

home:AndreasStieger:branches:OBS_Maintained:chromium/re2.openSUSE_Leap_15.0_Update@18834f5e6aa3d13d76b1df3688210121 -> openSUSE:Leap:15.0:Update/re2

expected origin is 'openSUSE:Factory' (changed)

submission source found in origin (openSUSE:Factory)

home:AndreasStieger:branches:OBS_Maintained:chromium/re2.openSUSE_Leap_15.1_Update@9593c0d94067458d5eddf482b2055834 -> openSUSE:Leap:15.1:Update/re2

expected origin is 'openSUSE:Leap:15.0:Update' (changed)


Leap Reviewbot's avatar

home:AndreasStieger:branches:OBS_Maintained:chromium/chromium.openSUSE_Leap_15.0_Update@4ffa1137ab8b18310c6b5bbfbffe198a -> openSUSE:Leap:15.0:Update/chromium

expected origin is 'openSUSE:Factory' (changed)

sr#743815 to openSUSE:Factory has different sources

home:AndreasStieger:branches:OBS_Maintained:chromium/chromium.openSUSE_Leap_15.1_Update@7cb24d75d1b9bb9b6d7486a4e1d8c613 -> openSUSE:Leap:15.1:Update/chromium

expected origin is 'openSUSE:Leap:15.0:Update' (changed)

home:AndreasStieger:branches:OBS_Maintained:chromium/re2.openSUSE_Leap_15.0_Update@18834f5e6aa3d13d76b1df3688210121 -> openSUSE:Leap:15.0:Update/re2

expected origin is 'openSUSE:Factory' (changed)

submission source found in origin (openSUSE:Factory)

home:AndreasStieger:branches:OBS_Maintained:chromium/re2.openSUSE_Leap_15.1_Update@9593c0d94067458d5eddf482b2055834 -> openSUSE:Leap:15.1:Update/re2

expected origin is 'openSUSE:Leap:15.0:Update' (changed)

Request History
Andreas Stieger's avatar

AndreasStieger created request

chromium 78.0.3904.70 bsc#1154806:
* CVE-2019-13699: Use-after-free in media
* CVE-2019-13700: Buffer overrun in Blink
* CVE-2019-13701: URL spoof in navigation
* CVE-2019-13702: Privilege elevation in Installer
* CVE-2019-13703: URL bar spoofing
* CVE-2019-13704: CSP bypass
* CVE-2019-13705: Extension permission bypass
* CVE-2019-13706: Out-of-bounds read in PDFium
* CVE-2019-13707: File storage disclosure
* CVE-2019-13708: HTTP authentication spoof
* CVE-2019-13709: File download protection bypass
* CVE-2019-13710: File download protection bypass
* CVE-2019-13711: Cross-context information leak
* CVE-2019-15903: Buffer overflow in expat
* CVE-2019-13713: Cross-origin data leak
* CVE-2019-13714: CSS injection
* CVE-2019-13715: Address bar spoofing
* CVE-2019-13716: Service worker state error
* CVE-2019-13717: Notification obscured
* CVE-2019-13718: IDN spoof
* CVE-2019-13719: Notification obscured


Saul Goodman's avatar

licensedigger accepted review

ok


Factory Auto's avatar

factory-auto accepted review

openSUSE:Leap:15.0:Update/chromium.openSUSE_Leap_15.0_Update::maintenance_incident: Check
script succeeded
openSUSE:Leap:15.0:Update/re2.openSUSE_Leap_15.0_Update::maintenance_incident: Check
script succeeded
openSUSE:Leap:15.1:Update/chromium.openSUSE_Leap_15.1_Update::maintenance_incident: Check
script succeeded
openSUSE:Leap:15.1:Update/re2.openSUSE_Leap_15.1_Update::maintenance_incident: Check
script succeeded


Maintenance Bot's avatar

maintbot added network:chromium as a reviewer

openSUSE:Leap:15.1:Update/re2.openSUSE_Leap_15.1_Update::maintenance_incident: Submission
for None by someone who is not maintainer in the devel project (network:chromium).
Please review


Maintenance Bot's avatar

maintbot added chromium as a reviewer

openSUSE:Leap:15.1:Update/re2.openSUSE_Leap_15.1_Update::maintenance_incident: Submission
for chromium by someone who is not maintainer in the devel project (network:chromium).
Please review


Maintenance Bot's avatar

maintbot accepted review

openSUSE:Leap:15.0:Update/chromium.openSUSE_Leap_15.0_Update::maintenance_incident: ok
openSUSE:Leap:15.0:Update/re2.openSUSE_Leap_15.0_Update::maintenance_incident: ok
openSUSE:Leap:15.1:Update/chromium.openSUSE_Leap_15.1_Update::maintenance_incident: ok
openSUSE:Leap:15.1:Update/re2.openSUSE_Leap_15.1_Update::maintenance_incident: ok


Tomáš Chvátal's avatar

scarabeus_iv accepted review


Tomáš Chvátal's avatar

scarabeus_iv accepted review


Tomáš Chvátal's avatar

scarabeus_iv approved review


Marcus Meissner's avatar

msmeissn moved maintenance target to openSUSE:Maintenance:11374


Marcus Meissner's avatar

msmeissn accepted request

accepted request 743876:Thanks!

For information about the update, see https://build.opensuse.org/project/maintenance_incidents/openSUSE:Maintenance

openSUSE Build Service is sponsored by