[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted chromium 97.0.4692.71-0.1~deb11u1 (source) into proposed-updates->stable-new, proposed-updates



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 13 Jan 2022 18:30:21 -0500
Source: chromium
Architecture: source
Version: 97.0.4692.71-0.1~deb11u1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Chromium Team <chromium@packages.debian.org>
Changed-By: Andres Salomon <dilinger@debian.org>
Closes: 861796 942962 955540 995212 996375
Changes:
 chromium (97.0.4692.71-0.1~deb11u1) bullseye-security; urgency=high
 .
   * Non-maintainer upload.
   * Stop building chromium's bunded gn and instead build-dep on generate-ninja.
   * Drop numerous patches related to gcc building, since we just build w/ clang.
   * Use python3 as default instead of relying on python2
     (closes: #942962, #996375).
   * Enable the ozone backend in the build (closes: #955540).
   * Automatically detect & enable Wayland support when launching chromium
     (closes: #861796).
   * Rename crashpad_handler to chrome_crashpad_handler.
   * No longer hardcode desktop GL implementation as default - it causes
     the chromium compositor's draw buffer to fill up & crash on my system.
   * Enable official builds.
   * New upstream stable release (closes: #995212).
     - CVE-2022-0096: Use after free in Storage. Reported by Yangkang
       (@dnpushme) of 360 ATA
     - CVE-2022-0097: Inappropriate implementation in DevTools. Reported by
       David Erceg
     - CVE-2022-0098: Use after free in Screen Capture. Reported by
       @ginggilBesel
     - CVE-2022-0099: Use after free in Sign-in. Reported by Rox
     - CVE-2022-0100: Heap buffer overflow in Media streams API. Reported by
       Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
       Corp. Ltd.
     - CVE-2022-0101: Heap buffer overflow in Bookmarks. Reported by raven
       (@raid_akame)
     - CVE-2022-0102: Type Confusion in V8. Reported by Brendon Tiszka
     - CVE-2022-0103: Use after free in SwiftShader. Reported by Abraruddin
       Khan and Omair
     - CVE-2022-0104: Heap buffer overflow in ANGLE. Reported by Abraruddin
       Khan and Omair
     - CVE-2022-0105: Use after free in PDF. Reported by Cassidy Kim of Amber
       Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
     - CVE-2022-0106: Use after free in Autofill. Reported by Khalil Zhani
     - CVE-2022-0107: Use after free in File Manager API. Reported by raven
       (@raid_akame)
     - CVE-2022-0108: Inappropriate implementation in Navigation. Reported by
       Luan Herrera (@lbherrera_)
     - CVE-2022-0109: Inappropriate implementation in Autofill. Reported by
       Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University
     - CVE-2022-0110: Incorrect security UI in Autofill. Reported by
       Alesandro Ortiz
     - CVE-2022-0111: Inappropriate implementation in Navigation. Reported by
       garygreen
     - CVE-2022-0112: Incorrect security UI in Browser UI. Reported by Thomas
       Orlita
     - CVE-2022-0113: Inappropriate implementation in Blink. Reported by Luan
       Herrera (@lbherrera_)
     - CVE-2022-0114: Out of bounds memory access in Web Serial. Reported by
       Looben Yang
     - CVE-2022-0115: Uninitialized Use in File API. Reported by Mark Brand
       of Google Project Zero
     - CVE-2022-0116: Inappropriate implementation in Compositing. Reported
       by Irvan Kurniawan (sourc7)
     - CVE-2022-0117: Policy bypass in Service Workers. Reported by
       Dongsung Kim (@kid1ng)
     - CVE-2022-0118: Inappropriate implementation in WebShare. Reported by
       Alesandro Ortiz
     - CVE-2022-0120: Inappropriate implementation in Passwords. Reported by
       CHAKRAVARTHI (Ruler96)
     (96.0.4664.110)
     - CVE-2021-4098: Insufficient data validation in Mojo. Reported by
       Sergei Glazunov of Google Project Zero
     - CVE-2021-4099: Use after free in Swiftshader. Reported by Aki Helin
       of Solita
     - CVE-2021-4100: Object lifecycle issue in ANGLE. Reported by Aki Helin
       of Solita
     - CVE-2021-4101: Heap buffer overflow in Swiftshader. Reported by
       Abraruddin Khan and Omair
     - CVE-2021-4102: Use after free in V8. Reported by Anonymous
     (96.0.4664.93)
     - CVE-2021-4052: Use after free in web apps. Reported by Wei Yuan of
       MoyunSec VLab
     - CVE-2021-4053: Use after free in UI. Reported by Rox
     - CVE-2021-4079: Out of bounds write in WebRTC. Reported by Brendon
       Tiszka
     - CVE-2021-4054: Incorrect security UI in autofill. Reported by
       Alesandro Ortiz
     - CVE-2021-4078: Type confusion in V8. Reported by Nan
       Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
     - CVE-2021-4055: Heap buffer overflow in extensions. Reported by Chen
       Rong
     - CVE-2021-4056: Type Confusion in loader. Reported by @__R0ng of 360
       Alpha Lab
     - CVE-2021-4057: Use after free in file API. Reported by Sergei
       Glazunov of Google Project Zero
     - CVE-2021-4058: Heap buffer overflow in ANGLE. Reported by Abraruddin
       Khan and Omair
     - CVE-2021-4059: Insufficient data validation in loader. Reported by
       Luan Herrera (@lbherrera_)
     - CVE-2021-4061: Type Confusion in V8. Reported by Paolo Severini
     - CVE-2021-4062: Heap buffer overflow in BFCache. Reported by Leecraso
       and Guang Gong of 360 Alpha Lab
     - CVE-2021-4063: Use after free in developer tools. Reported by
       Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
     - CVE-2021-4064: Use after free in screen capture. Reported by
       @ginggilBesel
     - CVE-2021-4065: Use after free in autofill. Reported by 5n1p3r0010
       from Topsec ChiXiao Lab
     - CVE-2021-4066: Integer underflow in ANGLE. Reported by Jaehun
       Jeong(@n3sk) of Theori
     - CVE-2021-4067: Use after free in window manager. Reported by
       @ginggilBesel
     - CVE-2021-4068: Insufficient validation of untrusted input in new tab
       page. Reported by NDevTK
     (96.0.4664.45)
     - CVE-2021-38008: Use after free in media. Reported by Marcin Towalski
     - CVE-2021-38009: Inappropriate implementation in cache.
       Reported by Luan Herrera (@lbherrera_)
     - CVE-2021-38006: Use after free in storage foundation.
       Reported by Sergei Glazunov of Google Project Zero
     - CVE-2021-38007: Type Confusion in V8. Reported by Polaris Feng and
       SGFvamll at Singular Security Lab
     - CVE-2021-38005: Use after free in loader.
       Reported by Sergei Glazunov of Google Project Zero
     - CVE-2021-38010: Inappropriate implementation in service workers.
       Reported by Sergei Glazunov of Google Project Zero
     - CVE-2021-38011: Use after free in storage foundation.
       Reported by Sergei Glazunov of Google Project Zero
     - CVE-2021-38012: Type Confusion in V8. Reported by Yonghwi Jin (@jinmo123)
     - CVE-2021-38013: Heap buffer overflow in fingerprint recognition.
       Reported by raven (@raid_akame)
     - CVE-2021-38014: Out of bounds write in Swiftshader.
       Reported by Atte Kettunen of OUSPG
     - CVE-2021-38015: Inappropriate implementation in input.
       Reported by David Erceg
     - CVE-2021-38016: Insufficient policy enforcement in background fetch.
       Reported by Maurice Dauer
     - CVE-2021-38017: Insufficient policy enforcement in iframe sandbox.
       Reported by NDevTK
     - CVE-2021-38018: Inappropriate implementation in navigation.
       Reported by Alesandro Ortiz
     - CVE-2021-38019: Insufficient policy enforcement in CORS.
       Reported by Maurice Dauer
     - CVE-2021-38020: Insufficient policy enforcement in contacts picker.
       Reported by Luan Herrera (@lbherrera_)
     - CVE-2021-38021: Inappropriate implementation in referrer.
       Reported by Prakash (@1lastBr3ath)
     - CVE-2021-38022: Inappropriate implementation in WebAuthentication.
       Reported by Michal Kepkowski
     (95.0.4638.69)
     - CVE-2021-37997: Use after free in Sign-In. Reported by Wei Yuan of
       MoyunSec VLab
     - CVE-2021-37998: Use after free in Garbage Collection. Reported by
       Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
       Corp. Ltd.
     - CVE-2021-37999: Insufficient data validation in New Tab Page.
       Reported by Ashish Arun Dhone
     - CVE-2021-38000: Insufficient validation of untrusted input in Intents.
       Reported by Clement Lecigne, Neel Mehta, and Maddie Stone of Google
       Threat Analysis Group
     - CVE-2021-38001: Type Confusion in V8. Reported by @s0rrymybad of
       Kunlun Lab via Tianfu Cup
     - CVE-2021-38002: Use after free in Web Transport. Reported by @__R0ng
       of 360 Alpha Lab, 漏洞研究院青训队 via Tianfu Cup
     - CVE-2021-38003: Inappropriate implementation in V8. Reported by Clément
       Lecigne from Google TAG and Samuel Groß from Google Project Zero
     - CVE-2021-38004: Insufficient policy enforcement in Autofill. Reported
       by Mark Amery
     (95.0.4638.54)
     - CVE-2021-37981: Heap buffer overflow in Skia. Reported by Yangkang
       (@dnpushme) of 360 ATA
     - CVE-2021-37982: Use after free in Incognito. Reported by Weipeng Jiang
       (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
     - CVE-2021-37983: Use after free in Dev Tools. Reported by Zhihua Yao
       of KunLun Lab
     - CVE-2021-37984: Heap buffer overflow in PDFium. Reported by Antti
       Levomäki, Joonas Pihlaja and Christian Jalio from Forcepoint
     - CVE-2021-37985: Use after free in V8. Reported by Yangkang (@dnpushme)
       of 360 ATA
     - CVE-2021-37986: Heap buffer overflow in Settings.
       Reported by raven (@raid_akame)
     - CVE-2021-37987: Use after free in Network APIs. Reported by
       Yangkang (@dnpushme) of 360 ATA
     - CVE-2021-37988: Use after free in Profiles. Reported by raven
      (@raid_akame)
     - CVE-2021-37989: Inappropriate implementation in Blink.
       Reported by Matt Dyas, Ankur Sundara
     - CVE-2021-37990: Inappropriate implementation in WebView. Reported by
       Kareem Selim of CyShield
     - CVE-2021-37991: Race in V8. Reported by Samuel Groß of Google Project
       Zero
     - CVE-2021-37992: Out of bounds read in WebAudio. Reported by
       sunburst@Ant Security Light-Year Lab
     - CVE-2021-37993: Use after free in PDF Accessibility. Reported by Cassidy
       Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
     - CVE-2021-37996: Insufficient validation of untrusted input in Downloads.
       Reported by Anonymous
     - CVE-2021-37994: Inappropriate implementation in iFrame Sandbox.
       Reported by David Erceg
     - CVE-2021-37995: Inappropriate implementation in WebApp Installer.
       Reported by Terence Eden
     (94.0.4606.81)
     - CVE-2021-37977: Use after free in Garbage Collection. Reported by
       Anonymous
     - CVE-2021-37978: Heap buffer overflow in Blink. Reported by Yangkang
       (@dnpushme) of 360 ATA
     - CVE-2021-37979: Heap buffer overflow in WebRTC. Reported by Marcin
       Towalski of Cisco Talos
     - CVE-2021-37980: Inappropriate implementation in Sandbox. Reported by
       Yonghwi Jin (@jinmo123) of Theori
     (94.0.4606.71)
     - CVE-2021-37974: Use after free in Safe Browsing. Reported by Weipeng
       Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
     - CVE-2021-37975: Use after free in V8. Reported by Anonymous
     - CVE-2021-37976: Information leak in core. Reported by Clément Lecigne
       from Google TAG, with technical assistance from Sergei Glazunov and
       Mark Brand from Google Project Zero
     (94.0.4606.61)
     - CVE-2021-37973: Use after free in Portals. Reported by Clément Lecigne
       from Google TAG, with technical assistance from Sergei Glazunov and
       Mark Brand from Google Project Zero
     (94.0.4606.54)
     - CVE-2021-37956 Use after free in Offline use. Reported by Huyna at
       Viettel Cyber Security
     - CVE-2021-37957: Use after free in WebGPU. Reported by Looben Yang
     - CVE-2021-37958: Inappropriate implementation in Navigation. Reported by
       James Lee (@Windowsrcer)
     - CVE-2021-37959: Use after free in Task Manager. Reported by raven
       (@raid_akame)
     - CVE-2021-37961: Use after free in Tab Strip. Reported by Khalil Zhani
     - CVE-2021-37962: Use after free in Performance Manager. Reported by Sri
     - CVE-2021-37963: Side-channel information leakage in DevTools. Reported
       by Daniel Genkin and Ayush Agarwal, University of Michigan, Eyal Ronen
       and Shaked Yehezkel, Tel Aviv University, Sioli O’Connell, University of
       Adelaide, and Jason Kim, Georgia Institute of Technology
     - CVE-2021-37964: Inappropriate implementation in ChromeOS Networking.
       Reported by Hugo Hue and Sze Yiu Chau of the Chinese University of Hong
       Kong
     - CVE-2021-37965: Inappropriate implementation in Background Fetch API.
       Reported by Maurice Dauer
     - CVE-2021-37966: Inappropriate implementation in Compositing. Reported by
       Mohit Raj (shadow2639)
     - CVE-2021-37967: Inappropriate implementation in Background Fetch API.
       Reported by SorryMybad (@S0rryMybad) of Kunlun Lab
     - CVE-2021-37968: Inappropriate implementation in Background Fetch API.
       Reported by Maurice Dauer
     - CVE-2021-37969: Inappropriate implementation in Google Updater. Reported
       by Abdelhamid Naceri (halov)
     - CVE-2021-37970: Use after free in File System API. Reported by
       SorryMybad (@S0rryMybad) of Kunlun Lab
     - CVE-2021-37971: Incorrect security UI in Web Browser UI. Reported by
       Rayyan Bijoora
     - CVE-2021-37972: Out of bounds read in libjpeg-turbo. Reported by Xu
       Hanyu and Lu Yutao from Panguite-Forensics-Lab of Qianxin
Checksums-Sha1:
 75ff28b7b22b585c19b8849a230af234c3ae6b06 3779 chromium_97.0.4692.71-0.1~deb11u1.dsc
 3616e212d6f12237ef3110ac8925eeb0b01ba626 516819808 chromium_97.0.4692.71.orig.tar.xz
 f152b65765c74eeaff9a687e5f04c68683f1747c 152972 chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
 9a313b86d9929c4ab88b5c30b2488eb9842cca8f 25423 chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo
Checksums-Sha256:
 b544dcf4305d8a8b26e6735297e80dad38833bed4f64d02d76690dac0f8d5bd3 3779 chromium_97.0.4692.71-0.1~deb11u1.dsc
 cca093107bf6991b4777889012646455f8e520b446c9f27250653f98ed4bb7e0 516819808 chromium_97.0.4692.71.orig.tar.xz
 c580ae26caf4634eb4f29ad24f7caa0f1de0d149d2d11532a77f4a53f1a58eb5 152972 chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
 04571c8941bb500b3b9bf56ebb926a9c6997d76bc64957942747b48a7354e3f6 25423 chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo
Files:
 87822041004430424c90ae9efcb9579e 3779 web optional chromium_97.0.4692.71-0.1~deb11u1.dsc
 88cfb419d88af08f2925b9e6efb3921e 516819808 web optional chromium_97.0.4692.71.orig.tar.xz
 f0dbf9d8bdf53260d7aba6823c174edc 152972 web optional chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
 9a29fa7149c2f2a9d0cb60c3ebcda2fa 25423 web optional chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQJIBAEBCAAyFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmHgvfEUHGRpbGluZ2Vy
QGRlYmlhbi5vcmcACgkQZF0CR8NudjewCQ/9E7osRJ3Ej9tV40r4SilE9H+uFjYB
tcvoeTpQ6Vh3KhmX8OAJ7KqnG/NVKwizjqRzX80sXgtT6pIONUzoCDlPOcaCq+U8
5UNXOdgbOzF9PVHaHFOA1PyuQaQBc2ZW6xBbiLVU++uG55ZdCCQbrTNiDktYHqDF
05F37m1ZfspaSIh7eECBR/fV+Rp+hcVXvu+L4GcS2cHshMbGC044CI5X5Zf1Arh3
k2+uUvtZvD63aViguANQUtZo2e4h0IiDycKYbfNkzanknST+Nb7ZArq7jvLEMNde
OllgFyd7vqYVFvYLnTJdtWSiEIys1fsZqoabHAucE4XAKUGVNLIiOEdyT1y2u1PD
1KIux6rGCY6PgRlrHtD01m1MFf8eREGfs1TmcP9jIVl63YLT7wIh8v8dPTh9OxU5
5VZUzgs1EbfM0p/l95VOqhBrjDakugMVVgWTfzLw+XLr1aWglSnGjHMwvA1J4oIA
hhqe+GTPANMd4WlCyYpqbF8JTpw9KXqP5kbFbkciwSwtxR7J8YdUGWO4wRZOzrTp
JdkeUURVLCxrjwEi9sPp+N48EI+FjwTAVK6+r0NugNaNLJgAnCBH/xkD8IhMNWG6
PZx/iKgVZ7LuzcdJCZ4OcJijfOEevPyg/rEk2jQ0PGhQu3MPe0YfOsvQZo4MXcpM
aNBJGcTdl1SOrac=
=d8kj
-----END PGP SIGNATURE-----


Reply to: