We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[1491459] High CVE-2023-6348: Type Confusion in Spellcheck https://chromium.googlesource.com/chromium/src/+/89c6b117a2da77cb7e089b5884f5c6b64818205a Fix unsafe type casting in BindTextSuggestionHost
[1494461] High CVE-2023-6347: Use after free in Mojo. https://chromium.googlesource.com/chromium/src/+/b61ae97f6c2d5c9a103bd811e248d96804639ca9 Fix IPC Channel pipe teardown
[1500856] High CVE-2023-6346: Use after free in WebAudio https://chromium.googlesource.com/chromium/src/+/e0ade1941c6a07cf865c33678a056c6ce7f048a1 Check context status before creating new platform destination
[1501766] High CVE-2023-6350: Out of bounds memory access in libavif [1501770] High CVE-2023-6351: Use after free in libavif https://chromium.googlesource.com/external/github.com/AOMediaCodec/libavif.git/+log/0d4747a..1f2ccf0 2023-11-15 [email protected] Remove potential out of bound access to alphaItemIndices 2023-11-15 [email protected] Do not store potentially invalid pointers
[1505053] High CVE-2023-6345: Integer overflow in Skia https://skia.googlesource.com/skia.git/+/89907a0ce7c0c883898b8c88b55b7b7f733f7058 Google is aware that an exploit for CVE-2023-6345 exists in the wild.
found also:
The text was updated successfully, but these errors were encountered:
commit: 91419aa builder: https://github.com/uazo/cromite/actions/runs/7032435393 release: https://github.com/uazo/cromite/releases/tag/v119.0.6045.200-91419aa0e8f321e4ff5cdceebaad8852323c2c86 docker image: uazo/cromite-build:119.0.6045.200-91419aa0e8f321e4ff5cdceebaad8852323c2c86
changes:
Sorry, something went wrong.
next version #587
No branches or pull requests
[1491459] High CVE-2023-6348: Type Confusion in Spellcheck https://chromium.googlesource.com/chromium/src/+/89c6b117a2da77cb7e089b5884f5c6b64818205a
Fix unsafe type casting in BindTextSuggestionHost
[1494461] High CVE-2023-6347: Use after free in Mojo. https://chromium.googlesource.com/chromium/src/+/b61ae97f6c2d5c9a103bd811e248d96804639ca9
Fix IPC Channel pipe teardown
[1500856] High CVE-2023-6346: Use after free in WebAudio https://chromium.googlesource.com/chromium/src/+/e0ade1941c6a07cf865c33678a056c6ce7f048a1
Check context status before creating new platform destination
[1501766] High CVE-2023-6350: Out of bounds memory access in libavif
[1501770] High CVE-2023-6351: Use after free in libavif https://chromium.googlesource.com/external/github.com/AOMediaCodec/libavif.git/+log/0d4747a..1f2ccf0
2023-11-15 [email protected] Remove potential out of bound access to alphaItemIndices
2023-11-15 [email protected] Do not store potentially invalid pointers
[1505053] High CVE-2023-6345: Integer overflow in Skia
https://skia.googlesource.com/skia.git/+/89907a0ce7c0c883898b8c88b55b7b7f733f7058
Google is aware that an exploit for CVE-2023-6345 exists in the wild.
found also:
The text was updated successfully, but these errors were encountered: