-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 22 Aug 2024 14:06:28 -0400 Source: chromium Architecture: source Version: 128.0.6613.84-1~deb12u1 Distribution: bookworm-security Urgency: high Maintainer: Debian Chromium Team <chromium@packages.debian.org> Changed-By: Andres Salomon <dilinger@debian.org> Changes: chromium (128.0.6613.84-1~deb12u1) bookworm-security; urgency=high . [ Andres Salomon ] * New upstream stable release. - CVE-2024-7964: Use after free in Passwords. Reported by Anonymous. - CVE-2024-7965: Inappropriate implementation in V8. Reported by TheDog. - CVE-2024-7966: Out of bounds memory access in Skia. Reported by Renan Rios (@HyHy100). - CVE-2024-7967: Heap buffer overflow in Fonts. Reported by Tashita Software Security. - CVE-2024-7968: Use after free in Autofill. Reported by Han Zheng (HexHive). - CVE-2024-7969: Type Confusion in V8. Reported by CFF of Topsec Alpha Team. - CVE-2024-7971: Type confusion in V8. Reported by Microsoft Threat Intelligence Center (MSTIC), Microsoft Security Response Center (MSRC). - CVE-2024-7972: Inappropriate implementation in V8. Reported by Simon Gerst (intrigus-lgtm). - CVE-2024-7973: Heap buffer overflow in PDFium. Reported by soiax. - CVE-2024-7974: Insufficient data validation in V8 API. Reported by bowu(@gocrashed). - CVE-2024-7975: Inappropriate implementation in Permissions. Reported by Thomas Orlita. - CVE-2024-7976: Inappropriate implementation in FedCM. Reported by Alesandro Ortiz. - CVE-2024-7977: Insufficient data validation in Installer. Reported by Kim Dong-uk (@justlikebono). - CVE-2024-7978: Insufficient policy enforcement in Data Transfer. Reported by NDevTK. - CVE-2024-7979: Insufficient data validation in Installer. Reported by VulnNoob. - CVE-2024-7980: Insufficient data validation in Installer. Reported by VulnNoob. - CVE-2024-7981: Inappropriate implementation in Views. Reported by Thomas Orlita. - CVE-2024-8033: Inappropriate implementation in WebApp Installs. Reported by Lijo A.T. - CVE-2024-8034: Inappropriate implementation in Custom Tabs. Reported by Bharat (mrnoob). - CVE-2024-8035: Inappropriate implementation in Extensions. Reported by Microsoft. * d/copyright: delete third_party/siso/ which contains binaries. * d/rules: set safe_browsing_use_unrar=false to disable unrar. * d/patches: - fixes/blink-frags.patch: drop, merged upstream. - fixes/stats-collector.patch: drop, upstream deleted broken code. - fixes/chromium-browser-ui-missing-deps.patch: drop, fixed upstream. - upstream/armhf-ftbfs.patch: drop, merged upstream. - upstream/containers-header.patch: drop, merged upstream. - upstream/crabbyav1f.patch: drop, merged upstream. - upstream/lock-impl.patch: drop, merged upstream. - upstream/paint-layer-header.patch: drop, merged upstream. - disable/unrar.patch: drop, merged upstream w/ build arg. - bookworm/nvt.patch: drop, no longer needed. - fixes/ps-print.patch: refresh. - system/openjpeg.patch: refresh. - bookworm/clang16.patch: refresh & remove another unsupported option. - bookworm/constexpr.patch: refresh & add more fixes. - bookworm/lex-3way.patch: pull in another STL function from clang-17. - bookworm/blink-attrib.patch: add build fix to reorder __attribute__. - fixes/highway-include-path.patch: upstream fixed the original issue in a broken way, making this worse. Add more to this patch to work around that. - bookworm/bubble-contents.patch: refresh. - bookworm/crabbyav1f.patch: refresh. - bookworm/gn-absl.patch: refresh. . [ Daniel Richard G. ] * d/rules: Parameterize Rust sysroot to simplify using a different one. * d/patches: - bookworm/highway-blink.patch: Avoid armhf/arm64 FTBFS by disabling Blink feature that requires newer libhwy-dev version. . [ Timothy Pearson ] * d/patches/ppc64le: - third_party/dawn-fix-typos.patch: Refresh for upstream changes - third_party/use-sysconf-page-size-on-ppc64.patch: Refresh for upstream changes - third_party/0002-Add-PPC64-generated-files-for-boringssl.patch: Refresh for upstream changes - workarounds/HACK-debian-clang-disable-base-musttail.patch: Disable musttail on ppc64el platforms . chromium (127.0.6533.119-1) unstable; urgency=high . [ Andres Salomon ] * New upstream stable release. * d/patches/upstream/armhf-ftbfs.patch: armhf FTBFS fix from upstream. . [ Daniel Richard G. ] * d/patches: - ppc64le/crashpad/0002-Include-cstddef-to-fix-build.patch: Drop, as the original FTBFS that this fixed is no longer reproducible. * d/rules: Add to ppc64el CXXFLAGS to quash copious AltiVec warnings. Checksums-Sha1: e8f751f5f5f05be5b14cf3cf08d8de786002cda8 3789 chromium_128.0.6613.84-1~deb12u1.dsc 486e5db00ef5b4172968180c825c7e2ad4e8e364 906389068 chromium_128.0.6613.84.orig.tar.xz d38b29c288d98328836c16e4be4761d7999df222 8490040 chromium_128.0.6613.84-1~deb12u1.debian.tar.xz faa1b8470a806cfc92699f76a050c9c8f92ae149 22054 chromium_128.0.6613.84-1~deb12u1_source.buildinfo Checksums-Sha256: 41805ac829dd47486aae81aa220abee3c1823b1ccfbb6736377ec90866b1832d 3789 chromium_128.0.6613.84-1~deb12u1.dsc 247d056eb23920a261e3be2f1df48cb715e3e3438591b450f1204b12a22e349a 906389068 chromium_128.0.6613.84.orig.tar.xz 98f7a05bd5eceaeda114071c89b2c35af986d36d6d1314d4bb2cb1e47386410c 8490040 chromium_128.0.6613.84-1~deb12u1.debian.tar.xz 98b532aa98466ef083d6ba4d2d33a8f2c41635575830462ea3b13a5d24f82a68 22054 chromium_128.0.6613.84-1~deb12u1_source.buildinfo Files: f728fe13294c44d18e17203a4942050f 3789 web optional chromium_128.0.6613.84-1~deb12u1.dsc 92bdb7804fd2baef329ad84275fd8333 906389068 web optional chromium_128.0.6613.84.orig.tar.xz f6f9ab8885fea0c5df0874d43bf13895 8490040 web optional chromium_128.0.6613.84-1~deb12u1.debian.tar.xz e7e8cf9e4c60f8427d5110b0203f4e4d 22054 web optional chromium_128.0.6613.84-1~deb12u1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQJIBAEBCAAyFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmbH44cUHGRpbGluZ2Vy QGRlYmlhbi5vcmcACgkQZF0CR8NudjcZAw//UvHldQZ4fAKnv6KUsEMIcdao56CD lr0BfzXSsyAHfyK6kI9tZUHOOL01KUz9qPTD8dpDQKkt9fIGoGkTRJP4z2uMDWGt Q94+FgbVQEEhe2U0fKDkD6ILDg46WAWPtfZOwwufDZi9Nuq3vmcLcN++fZZkREhH W99Lo/PMDwtVyWQwES192lp5DVP50e/GkUcKpnKj7vif6aZJDu7cgia8hNkeQbXR Lz7Prgs3gmxo2Dg+2DXANyf3c5z9fVt0L29/88wn5D0DWD0Aij0vvUD3aFNRbwYG BNHKPl3I5NbswiLKuoD+8cZYDT/hL1zQ8jpPOO/Un3sx+uELCxvxEk4r7ydDTE7P XLfLtOFrl9S/c5Q/m98UvvIkXWtVa2s5ivkQXMAZIBNAnYujWnZZQwjxnFtfb0co +8jxw8A/GapMqh4nVmlRMGM1XGWUeo3HcZfwUrn/Xv7UrcZE9H4r7gPsGHFVc/mq qA0hrBhbkZgylBpqqlOdditZJUWriJ/nilcXDTPvtJTTXG8Izoda7gdlQ17yDEB7 WZKsDr7PP3yL1g6TqiqR29am1aNuZjSYttfEr24ccAORxbOTuSK5Zcuzzqer5D3J +y+74jfne749eCuAPKiE07yZsy11rp1HP+wu0cUWAJw5ShTzpiSHeygbbjO11kL9 mKCGqh9fdP9j9CE= =6Ryv -----END PGP SIGNATURE-----