-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Wed, 31 Aug 2022 20:48:11 -0400 Source: chromium Architecture: source Version: 105.0.5195.52-1 Distribution: unstable Urgency: high Maintainer: Debian Chromium Team <chrom...@packages.debian.org> Changed-By: Andres Salomon <dilin...@debian.org> Closes: 987292 Changes: chromium (105.0.5195.52-1) unstable; urgency=high . * New upstream stable release. - CVE-2022-3038: Use after free in Network Service. Reported by Sergei Glazunov of Google Project Zero. - CVE-2022-3039: Use after free in WebSQL. Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research Institute. - CVE-2022-3040: Use after free in Layout. Reported by Anonymous. - CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute. - CVE-2022-3042: Use after free in PhoneHub. Reported by koocola (@alo_cook) and Guang Gong of 360 Vulnerability Research Institute. - CVE-2022-3043: Heap buffer overflow in Screen Capture. Reported by @ginggilBesel. - CVE-2022-3044: Inappropriate implementation in Site Isolation. Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research - CVE-2022-3045: Insufficient validation of untrusted input in V8. Reported by Ben Noordhuis <i...@bnoordhuis.nl>. - CVE-2022-3046: Use after free in Browser Tag. Reported by Rong Jian of VRI. - CVE-2022-3071: Use after free in Tab Strip. Reported by @ginggilBesel. - CVE-2022-3047: Insufficient policy enforcement in Extensions API. Reported by Maurice Dauer. - CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen. Reported by Andr.Ess. - CVE-2022-3049: Use after free in SplitScreen. Reported by @ginggilBesel. - CVE-2022-3050: Heap buffer overflow in WebUI. Reported by Zhihua Yao of KunLun Lab. - CVE-2022-3051: Heap buffer overflow in Exosphere. Reported by @ginggilBesel. - CVE-2022-3052: Heap buffer overflow in Window Manager. Reported by Khalil Zhani. - CVE-2022-3053: Inappropriate implementation in Pointer Lock. Reported by Jesper van den Ende (Pelican Party Studios). - CVE-2022-3054: Insufficient policy enforcement in DevTools. Reported by Kuilin Li. - CVE-2022-3055: Use after free in Passwords. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute. - CVE-2022-3056: Insufficient policy enforcement in Content Security Policy. Reported by Anonymous. - CVE-2022-3057: Inappropriate implementation in iframe Sandbox. Reported by Gareth Heyes. - CVE-2022-3058: Use after free in Sign-In Flow. Reported by raven at KunLun lab. * Drop workaround for lack of older clang's -ffile-prefix-map. This should make reproducible builds happy. * debian/copyright: - Update for new libevent location (moved out of base/). - libopenjpeg20 -> libopenjpeg * debian/patches: - debianization/support-i386.patch: refresh. - disable/catapult.patch: refresh. - disable/libaom-arm.patch: refresh. - system/event.patch: update for new libevent location. - system/openjpeg.patch: refresh. - bullseye/clang13.patch: drop part of patch dropped upstream. - upstream/disk-cache.patch: build fix pulled from upstream. - upstream/browser-finder.patch: build fix pulled from upstream. - upstream/masklayer-geom.patch: build fix pulled from upstream. - system/jsoncpp.patch: drop, merged upstream. - fixes/angle-wayland: build fix due to mismatched wayland headers on sid. Only needed until angle updates its copy of wayland. - disable/welcome-page.patch: drop. Upstream fixed the original issue some time ago, and this new version finally cleaned up the workaround. - fixes/connection-message.patch: drop it. I looked at sending this upstream, but the original extension doesn't exist any more, and chromium properly prints an error if a proxy is unreachable. If you can still reproduce the issue (described in http://bugs.debian.org/864539), let me know so I can get it fixed upstream. * debian/scripts/unbundle: upstream tripled the number of (previously vendored) libraries that we can use system versions of. However, the majority of them are either not in bullseye or are too old, so we'll have to wait to use the debian versions for the ones not newly added as build-deps. * Disable optimize_webui, due to a build failure using nodejs from bullseye. I'll reenable this when it either gets fixed or we're done with bullseye security support. * Remove sse3-support dependency and just refuse to run if SSE3 is not present. Breaking via preinst script isn't appropriate for packages that might be installed by default (eg, by Debian Edu). * debian/control: add build-deps for brotli, libdouble-conversion-dev, libwoff-dev, and libxnvctrl-dev (closes: #987292). * Rework default search engine stuff. People did not like the "Your browser is managed" and "Your administrator can change your browser setup remotely" messages, which are admittedly alarming. Instead of using /etc/chromium/policies/recommended/duckduckgo.json, delete that and use /etc/chromium/master_preferences instead. Checksums-Sha1: 8330c4899b5aec37c962d7acb2a7f68006ee3ada 3624 chromium_105.0.5195.52-1.dsc 6ba6f55075924cd84f5965df56e8f3af3a518187 649804380 chromium_105.0.5195.52.orig.tar.xz f7b18003f79ada31b41c2ced9ed884eae4107fef 211588 chromium_105.0.5195.52-1.debian.tar.xz 4adafac6ba800a4df177955637292955b0cb541e 20210 chromium_105.0.5195.52-1_source.buildinfo Checksums-Sha256: 4b2d5d0dbc7c7852c1630978ce219075464c415c4138effe78e464e6857d2c4a 3624 chromium_105.0.5195.52-1.dsc 0e6291a7ed25a05f888c75a5c4d9851d7caaef7a4e107726f7d1eec8009925a6 649804380 chromium_105.0.5195.52.orig.tar.xz e959b87ff9fcb5a7cb1cbe110fd23709ad6a0c136ae73d8e0ad13af2ec7341c1 211588 chromium_105.0.5195.52-1.debian.tar.xz d0bb34c157f172a4b70e0a3491bf0e1e2cef5ebac079bff711360d9f90979afb 20210 chromium_105.0.5195.52-1_source.buildinfo Files: 67d230fefd58ea5f30d46a500495d3e6 3624 web optional chromium_105.0.5195.52-1.dsc c54755caa29708fee3b7c55ebffcee6b 649804380 web optional chromium_105.0.5195.52.orig.tar.xz afa4af33287ed55f49b37f3a8be89d48 211588 web optional chromium_105.0.5195.52-1.debian.tar.xz 83a535f077dc0c09ae58032510b68227 20210 web optional chromium_105.0.5195.52-1_source.buildinfo
-----BEGIN PGP SIGNATURE----- iQJIBAEBCAAyFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmMQFKEUHGRpbGluZ2Vy QGRlYmlhbi5vcmcACgkQZF0CR8NudjdY4g/+KrR86TC1b+YWO4gS72mXW1Lgr3LY Ukm7+Oj6GFYfU72moXcXC8/L253hZLkbWZeTd77wIEIXQXkpqQEcnoYzqPMoT6Kx DECSe3D1e666u2oKrVJdr3sDVdOPze8Ug2h4HF6oGkhj57tDwzW5AD+/+GL7ZZXn RTNgLO/Fce2k3QDWVbzuc3lzlYH1JkBrKwr2Tx1/qM2k+1+ercz4TSgbXdIV9MXv r/loLS6bA/iV4fX1HaCNqtkFDl3+je4uAImHmpxEeIE0aC9EtQNT6MUdIPEPTsix P8S5avf5NOnxcgDFgQ51plO2RN0X0KXYpwck6S/2fKwLs+u40WF4xmZKm/wOaFwg +7INNMrNDd3zxNZ2AgRVy93/gMpstBVkR/STO2wRuCxevDRTx75R8T9pO9iJFhB9 EC1YldRwtkjvGNNfgCRPGZOLFNDctjSMGRx5mzBbiUmROMHHK/U6g8yfLJcK0J0J QH7aSP7zIwp0pJNMLeg99Lfr6Jm4SoNHpc/q7BMDiOLSo0u6aKu1ouT2D3CRrNfT eTQRWcVfjrx3zrkwjPrRQ79Dk1e327ra3DxJTYULArw1EwbIxAXpt+RJPW/2PGtj CiOcTqHzhmhGAXzK+haR3ObbW3zTACyBxFzriDka6Io7oHB/HJKDgufbqpofZPGu jxQQzn7YAf0QsZE= =k5XS -----END PGP SIGNATURE-----