Change log for chromium package in Debian

76150 of 195 results
Superseded in sid-release
chromium (108.0.5359.71-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-4174: Type Confusion in V8.
      Reported by Zhenghang Xiao (@Kipreyyy).
    - CVE-2022-4175: Use after free in Camera Capture.
      Reported by Leecraso and Guang Gong of 360 Alpha Lab.
    - CVE-2022-4176: Out of bounds write in Lacros Graphics.
      Reported by @ginggilBesel.
    - CVE-2022-4177: Use after free in Extensions.
      Reported by Chaoyuan Peng (@ret2happy).
    - CVE-2022-4178: Use after free in Mojo.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-4179: Use after free in Audio.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-4180: Use after free in Mojo. Reported by Anonymous.
    - CVE-2022-4181: Use after free in Forms. Reported by Aviv A.
    - CVE-2022-4182: Inappropriate implementation in Fenced Frames.
      Reported by Peter Nemeth.
    - CVE-2022-4183: Insufficient policy enforcement in Popup Blocker.
      Reported by David Sievers.
    - CVE-2022-4184: Insufficient policy enforcement in Autofill.
      Reported by Ahmed ElMasry.
    - CVE-2022-4185: Inappropriate implementation in Navigation.
      Reported by James Lee (@Windowsrcer).
    - CVE-2022-4186: Insufficient validation of untrusted input in Downloads.
      Reported by Luan Herrera (@lbherrera_).
    - CVE-2022-4187: Insufficient policy enforcement in DevTools.
      Reported by Axel Chong.
    - CVE-2022-4188: Insufficient validation of untrusted input in CORS.
      Reported by Philipp Beer (TU Wien).
    - CVE-2022-4189: Insufficient policy enforcement in DevTools.
      Reported by NDevTK.
    - CVE-2022-4190: Insufficient data validation in Directory.
      Reported by Axel Chong.
    - CVE-2022-4191: Use after free in Sign-In.
      Reported by Jaehun Jeong(@n3sk) of Theori.
    - CVE-2022-4192: Use after free in Live Caption.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-4193: Insufficient policy enforcement in File System API.
      Reported by Axel Chong.
    - CVE-2022-4194: Use after free in Accessibility. Reported by Anonymous.
    - CVE-2022-4195: Insufficient policy enforcement in Safe Browsing.
      Reported by Eric Lawrence of Microsoft.
  * d/copyright:
    - drop multiple ninja executables from upstream tarball.
    - Stop deleting chrome/test/data/*, since it's all just empty directories
      except for one BUILD.gn that is required to build.
  * d/scripts/unbundle: build against the bundled absl_utility.
  * d/patches:
    - upstream/fix-missing-cmath.patch: drop, merged upstream.
    - fixes/angle-wayland.patch: drop, merged upstream.
    - fixes/fix-arm-vfpv3-d16-libaom.patch: drop, merged upstream.
    - disable/unrar.patch: refresh due to 7z support added.
    - ppc64le/workarounds/HACK-third_party-libvpx-use-generic-gnu.patch:
      refresh for loongarch update.
    - ppc64le/third_party/use-sysconf-page-size-on-ppc64.patch: drop half of
      patch as upstream removed duplicate code.
    - fixes/disable-cxx20.patch: switch clang complication back to the c++17
      standard, as c++20 breaks linking.

 -- Andres Salomon <email address hidden>  Thu, 01 Dec 2022 22:23:10 -0500
Superseded in sid-release
chromium (107.0.5304.121-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-4135: Heap buffer overflow in GPU. Reported by Clement Lecigne
      of Google's Threat Analysis Group on 2022-11-22

 -- Timothy Pearson <email address hidden>  Sat, 26 Nov 2022 12:34:00 -0600
Superseded in sid-release
chromium (107.0.5304.110-2) unstable; urgency=high

  * Fix bullseye/mulodic.patch to actually work right. Sigh.

 -- Andres Salomon <email address hidden>  Thu, 10 Nov 2022 13:48:01 -0500
Superseded in sid-release
chromium (107.0.5304.110-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3885: Use after free in V8. Reported by gzobqq@.
    - CVE-2022-3886: Use after free in Speech Recognition.
    - CVE-2022-3887: Use after free in Web Workers. Reported by anonymous.
    - CVE-2022-3888: Use after free in WebCodecs. Reported by Peter Nemeth.
    - CVE-2022-3889: Type Confusion in V8. Reported by anonymous.
    - CVE-2022-3890: Heap buffer overflow in Crashpad. Reported by anonymous.
  * Clean up old crash dump files on launch (closes: #1015931).

 -- Andres Salomon <email address hidden>  Wed, 09 Nov 2022 19:57:34 -0500
Superseded in sid-release
chromium (107.0.5304.87-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3723: Type Confusion in V8. Reported by Jan Vojtěšek, Milánek,
      and Przemek Gmerek of Avast.
  * Revert v4l2 enable for arm platforms until a build error is fixed.

 -- Andres Salomon <email address hidden>  Fri, 28 Oct 2022 07:02:02 -0400
Superseded in sid-release
chromium (107.0.5304.68-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-3652: Type Confusion in V8. Reported by srodulv and ZNMchtss at
      S.S.L Team.
    - CVE-2022-3653: Heap buffer overflow in Vulkan. Reported by SeongHwan Park
      (SeHwa).
    - CVE-2022-3654: Use after free in Layout. Reported by Sergei Glazunov of
      Google Project Zero.
    - CVE-2022-3655: Heap buffer overflow in Media Galleries. Reported by
      koocola(@alo_cook) and Guang Gong of 360 Vulnerability Research Institute.
    - CVE-2022-3656: Insufficient data validation in File System. Reported by
      Ron Masas, Imperva.
    - CVE-2022-3657: Use after free in Extensions. Reported by Omri Bushari,
      Talon Cyber Security.
    - CVE-2022-3658: Use after free in Feedback service on Chrome OS. Reported
      by Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability Research
      Institute.
    - CVE-2022-3659: Use after free in Accessibility. Reported by @ginggilBesel.
    - CVE-2022-3660: Inappropriate implementation in Full screen mode. Reported
      by Irvan Kurniawan (sourc7).
    - CVE-2022-3661: Insufficient data validation in Extensions. Reported by
      Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University.
  * Disable building against QT5 (for now).
    https://groups.google.com/a/chromium.org/g/chromium-packagers/c/-2VGexQAK6w
  * debian/copyright:
    - delete third_party/dawn/tools/golang binaries.
  * debian/patches:
    - upstream/armhf-ftbfs.patch: drop, merged upstream.
    - upstream/fix-nullptr-qual.patch: drop, merged upstream.
    - disable/catapult.patch: delete add'l blink reference to catapult.
    - bullseye/clang13.patch: refresh for minor upstream changes.
    - ppc64le/workarounds/HACK-third_party-libvpx-use-generic-gnu.patch: refresh
    - disable/clang-version-check.patch: added to fix build failure. Needs
      to go upstream.
    - ppc64le/workarounds/HACK-debian-clang-disable-skia-musttail.patch:
      drop, upstream skia stopped using clang::musttail.
    - upstream/re-fix-tflite.patch: re-add a build fix that upstream lost.

  [ Timothy Pearson ]
  * regenerate libaom configuration on ppc64el systems.

 -- Andres Salomon <email address hidden>  Tue, 25 Oct 2022 17:40:14 -0400
Superseded in sid-release
chromium (106.0.5249.119-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3445: Use after free in Skia. Reported by Nan Wang
      (@eternalsakura13) and Yong Liu of 360 Vulnerability Research Institute on
      2022-09-16
    - CVE-2022-3446: Heap buffer overflow in WebSQL. Reported by Kaijie Xu
      (@kaijieguigui) on 2022-09-26
    - CVE-2022-3447: Inappropriate implementation in Custom Tabs. Reported by
      Narendra Bhati of Suma Soft Pvt. Ltd. Pune (India) on 2022-09-22
    - CVE-2022-3448: Use after free in Permissions API. Reported by raven at
      KunLun lab on 2022-09-13
    - CVE-2022-3449: Use after free in Safe Browsing. Reported by asnine on
      2022-09-17
    - CVE-2022-3450: Use after free in Peer Connection. Reported by Anonymous on
      2022-09-30

 -- Timothy Pearson <email address hidden>  Tue, 11 Oct 2022 19:42:00 -0500
Superseded in sid-release
chromium (106.0.5249.103-2) unstable; urgency=low

  * Reduce baseline compatibility for ppc64el builds from POWER9
    to POWER8.  This matches the current Debian build farm.

 -- Timothy Pearson <email address hidden>  Sat, 08 Oct 2022 14:35:00 -0500
Superseded in sid-release
chromium (106.0.5249.103-1) unstable; urgency=medium

  * New upstream release.
  * Add ppc64el patches maintained by me, and enable builds for ppc64el
    (closes #1005083).

 -- Timothy Pearson <email address hidden>  Fri, 07 Oct 2022 17:54:00 -0500
Superseded in sid-release
chromium (106.0.5249.91-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3370: Use after free in Custom Elements.
      Reported by Aviv A.
    - CVE-2022-3373: Out of bounds write in V8.
      Reported by Tibor Klajnscek.

 -- Andres Salomon <email address hidden>  Sat, 01 Oct 2022 03:21:58 -0400
Superseded in sid-release
chromium (106.0.5249.61-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-3304: Use after free in CSS. Reported by Anonymous.
    - CVE-2022-3201: Insufficient validation of untrusted input in
      Developer Tools. Reported by NDevTK.
    - CVE-2022-3305: Use after free in Survey. Reported by Nan
      Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability
      Research Institute.
    - CVE-2022-3306: Use after free in Survey. Reported by Nan
      Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability
      Research Institute.
    - CVE-2022-3307: Use after free in Media.
      Reported by Anonymous Telecommunications Corp. Ltd.
    - CVE-2022-3308: Insufficient policy enforcement in Developer Tools.
      Reported by Andrea Cappa (zi0Black) @ Shielder.
    - CVE-2022-3309: Use after free in Assistant.
      Reported by zh1x1an1221 of Ant Group Tianqiong Security Lab.
    - CVE-2022-3310: Insufficient policy enforcement in Custom Tabs.
      Reported by Ashwin Agrawal from Optus, Sydney.
    - CVE-2022-3311: Use after free in Import.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-3312: Insufficient validation of untrusted input in VPN.
      Reported by Andr.Ess.
    - CVE-2022-3313: Incorrect security UI in Full Screen.
      Reported by Irvan Kurniawan (sourc7).
    - CVE-2022-3314: Use after free in Logging. Reported by Anonymous.
    - CVE-2022-3315: Type confusion in Blink. Reported by Anonymous.
    - CVE-2022-3316: Insufficient validation of untrusted input in Safe
      Browsing. Reported by Sven Dysthe (@svn_dy).
    - CVE-2022-3317: Insufficient validation of untrusted input in
      Intents. Reported by Hafiizh.
    - CVE-2022-3318: Use after free in ChromeOS Notifications.
      Reported by GraVity0.
  * debian/patches:
    - disable/angle-perftests.patch: drop most of patch.
      build_angle_perftests=false is set in d/rules, so no need to patch
      it and its dependencies.
    - upstream/browser-finder.patch: drop, merged upstream.
    - upstream/disk-cache.patch: drop, merged upstream.
    - upstream/masklayer-geom.patch: drop, merged upstream.
    - fixes/tflite.patch: drop, merged upstream.
    - bullseye/clang13.patch: update for upstream switching from one
      unsupported clang warning flag to another.
    - disable/catapult.patch: refresh.
    - disable/installer.patch: drop, as there's no real need to delete
      chrome/install_static; there's no licensing issues and it's only
      actually built on windows.
    - upstream/fix-missing-cmath.patch: added from upstream to fix ftbfs.
    - upstream/fix-nullptr-qual.patch: added from upstream to fix ftbfs.
    - fixes/fix-arm-vfpv3-d16-libaom.patch: add to fix a problem that
      was currently papered over by disabling libaom on arm. This new
      patch (hopefully) allows libaom to be built for the armhf arch.
    - disable/libaom-arm.patch: drop now that we've fixed libaom on arm.
    - system/event.patch: remove some old unused bits that patch gn.
  * Stop deleting chrome/install_static in d/copyright, and also start
    deleting third party libraries that we began linking to in v105 as
    well as tools/gn.
  * Remove mgilbert as an uploader; thanks for all your work on chromium
    packaging!

 -- Andres Salomon <email address hidden>  Tue, 27 Sep 2022 14:14:44 -0400
Superseded in sid-release
chromium (105.0.5195.125-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3195: Out of bounds write in Storage. Reported by
      Ziling Chen and Nan Wang(@eternalsakura13) of 360 Vulnerability
      Research Institute.
    - CVE-2022-3196: Use after free in PDF. Reported by triplepwns.
    - CVE-2022-3197: Use after free in PDF. Reported by triplepwns.
    - CVE-2022-3198: Use after free in PDF. Reported by MerdroidSG.
    - CVE-2022-3199: Use after free in Frames. Reported by Anonymous.
    - CVE-2022-3200: Heap buffer overflow in Internals.
      Reported by Richard Lorenz, SAP.
    - CVE-2022-3201: Insufficient validation of untrusted input in
      DevTools. Reported by NDevTK

 -- Andres Salomon <email address hidden>  Wed, 14 Sep 2022 12:43:31 -0400
Published in buster-release
chromium (90.0.4430.212-1~deb10u1) buster-security; urgency=medium

  * New upstream security release.
    - CVE-2021-30506: Incorrect security UI in Web App Installs. Reported by
      @retsew0x01
    - CVE-2021-30507: Inappropriate implementation in Offline. Reported by
      Alison Huffman
    - CVE-2021-30508: Heap buffer overflow in Media Feeds. Reported by Leecraso
      and Guang Gong
    - CVE-2021-30509: Out of bounds write in Tab Strip. Reported by David Erceg
    - CVE-2021-30510: Race in Aura. Reported by Weipeng Jiang
    - CVE-2021-30511: Out of bounds read in Tab Groups. Reported by David Erceg
    - CVE-2021-30512: Use after free in Notifications. Reported by ZhanJia Song
    - CVE-2021-30513: Type Confusion in V8. Reported by Man Yue Mo
    - CVE-2021-30514: Use after free in Autofill. Reported by koocola and Wang
    - CVE-2021-30515: Use after free in File API. Reported by Rong Jian and
      Guang Gong
    - CVE-2021-30516: Heap buffer overflow in History. Reported by ZhanJia Song
    - CVE-2021-30517: Type Confusion in V8. Reported by laural
    - CVE-2021-30518: Heap buffer overflow in Reader Mode. Reported by Jun
      Kokatsu
    - CVE-2021-30519: Use after free in Payments. Reported by asnine
    - CVE-2021-30520: Use after free in Tab Strip. Reported by Khalil Zhani

 -- Michael Gilbert <email address hidden>  Sat, 15 May 2021 20:39:40 +0000
Superseded in bullseye-release
chromium (104.0.5112.79-1~deb11u1) bullseye-security; urgency=high

  * Build with Clang 13 instead of the bullseye default of Clang 11.
  * New upstream stable release.
    - CVE-2022-2603: Use after free in Omnibox. Reported by Anonymous
    - CVE-2022-2604: Use after free in Safe Browsing. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2605: Out of bounds read in Dawn. Reported by Looben Yang
    - CVE-2022-2606: Use after free in Managed devices API. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2607: Use after free in Tab Strip. Reported by @ginggilBesel
    - CVE-2022-2608: Use after free in Overview Mode.
      Reported by Khalil Zhani
    - CVE-2022-2609: Use after free in Nearby Share. Reported by koocola
      (@alo_cook) and Guang Gong of 360 Vulnerability Research Institute
    - CVE-2022-2610: Insufficient policy enforcement in Background Fetch.
      Reported by Maurice Dauer
    - CVE-2022-2611: Inappropriate implementation in Fullscreen API.
      Reported by Irvan Kurniawan (sourc7)
    - CVE-2022-2612: Side-channel information leakage in Keyboard input.
      Reported by Erik Kraft (<email address hidden>),
      Martin Schwarzl (<email address hidden>)
    - CVE-2022-2613: Use after free in Input.
      Reported by Piotr Tworek (Vewd)
    - CVE-2022-2614: Use after free in Sign-In Flow.
      Reported by raven at KunLun lab
    - CVE-2022-2615: Insufficient policy enforcement in Cookies.
      Reported by Maurice Dauer
    - CVE-2022-2616: Inappropriate implementation in Extensions API.
      Reported by Alesandro Ortiz
    - CVE-2022-2617: Use after free in Extensions API.
      Reported by @ginggilBesel
    - CVE-2022-2618: Insufficient validation of untrusted input in
      Internals. Reported by asnine
    - CVE-2022-2619: Insufficient validation of untrusted input in Settings.
      Reported by Oliver Dunk
    - CVE-2022-2620: Use after free in WebUI. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2621: Use after free in Extensions.
      Reported by Huyna at Viettel Cyber Security
    - CVE-2022-2622: Insufficient validation of untrusted input in
      Safe Browsing. Reported by Imre Rad (@ImreRad) and @j00sean
    - CVE-2022-2623: Use after free in Offline. Reported by
      raven at KunLun lab
    - CVE-2022-2624: Heap buffer overflow in PDF. Reported by YU-CHANG
      CHEN and CHIH-YEN CHANG, working with DEVCORE Internship Program
  * debian/patches:
    - bullseye/nomerge.patch: drop, was only needed for clang-11.
    - bullseye/clang11.patch: drop clang-11 bits, rename to clang13.patch.
    - bullseye/blink-constexpr.patch: drop, only needed for clang-11.
    - bullseye/byteswap-constexpr2.patch: drop, only needed for clang-11.
    - disable/angle-perftests.patch: refresh
    - disable/catapult.patch: refresh & drop some no longer needed bits.
    - fixes/tflite.patch: fix a build error.
  * debian/copyright:
    - upstream dropped perfetto/ui/src/gen/.

 -- Andres Salomon <email address hidden>  Thu, 04 Aug 2022 21:39:17 -0400
Superseded in sid-release
chromium (105.0.5195.102-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-3075: Insufficient data validation in Mojo.
  * Update the cpu check to allow pni instead of sse3 (closes: #1018937).
  * Enable v4l2 for arm platforms. This also disables VA-API on arm64, so
    if that breaks things let me know. Thanks
    <email address hidden> for the patch (#1011346).
  * debian/patches:
    - upstream/armhf-ftbfs.patch: fix FTBFS introduced with v105 on armhf.

 -- Andres Salomon <email address hidden>  Mon, 05 Sep 2022 15:57:26 -0400
Superseded in sid-release
chromium (105.0.5195.52-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-3038: Use after free in Network Service.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-3039: Use after free in WebSQL. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Vulnerability
      Research Institute.
    - CVE-2022-3040: Use after free in Layout. Reported by Anonymous.
    - CVE-2022-3041: Use after free in WebSQL. Reported by Ziling Chen and
      Nan Wang(@eternalsakura13) of 360 Vulnerability Research Institute.
    - CVE-2022-3042: Use after free in PhoneHub. Reported by koocola
      (@alo_cook) and Guang Gong of 360 Vulnerability Research Institute.
    - CVE-2022-3043: Heap buffer overflow in Screen Capture.
      Reported by @ginggilBesel.
    - CVE-2022-3044: Inappropriate implementation in Site Isolation.
      Reported by Lucas Pinheiro, Microsoft Browser Vulnerability Research
    - CVE-2022-3045: Insufficient validation of untrusted input in V8.
      Reported by Ben Noordhuis <email address hidden>.
    - CVE-2022-3046: Use after free in Browser Tag.
      Reported by Rong Jian of VRI.
    - CVE-2022-3071: Use after free in Tab Strip.
      Reported by @ginggilBesel.
    - CVE-2022-3047: Insufficient policy enforcement in Extensions API.
      Reported by Maurice Dauer.
    - CVE-2022-3048: Inappropriate implementation in Chrome OS lockscreen.
      Reported by Andr.Ess.
    - CVE-2022-3049: Use after free in SplitScreen.
      Reported by @ginggilBesel.
    - CVE-2022-3050: Heap buffer overflow in WebUI.
      Reported by Zhihua Yao of KunLun Lab.
    - CVE-2022-3051: Heap buffer overflow in Exosphere.
      Reported by @ginggilBesel.
    - CVE-2022-3052: Heap buffer overflow in Window Manager.
      Reported by Khalil Zhani.
    - CVE-2022-3053: Inappropriate implementation in Pointer Lock.
      Reported by Jesper van den Ende (Pelican Party Studios).
    - CVE-2022-3054: Insufficient policy enforcement in DevTools.
      Reported by Kuilin Li.
    - CVE-2022-3055: Use after free in Passwords. Reported by Weipeng
      Jiang (@Krace) and Guang Gong of 360 Vulnerability Research
      Institute.
    - CVE-2022-3056: Insufficient policy enforcement in Content
      Security Policy. Reported by Anonymous.
    - CVE-2022-3057: Inappropriate implementation in iframe Sandbox.
      Reported by Gareth Heyes.
    - CVE-2022-3058: Use after free in Sign-In Flow.
      Reported by raven at KunLun lab.
  * Drop workaround for lack of older clang's -ffile-prefix-map. This
    should make reproducible builds happy.
  * debian/copyright:
    - Update for new libevent location (moved out of base/).
    - libopenjpeg20 -> libopenjpeg
  * debian/patches:
    - debianization/support-i386.patch: refresh.
    - disable/catapult.patch: refresh.
    - disable/libaom-arm.patch: refresh.
    - system/event.patch: update for new libevent location.
    - system/openjpeg.patch: refresh.
    - bullseye/clang13.patch: drop part of patch dropped upstream.
    - upstream/disk-cache.patch: build fix pulled from upstream.
    - upstream/browser-finder.patch: build fix pulled from upstream.
    - upstream/masklayer-geom.patch: build fix pulled from upstream.
    - system/jsoncpp.patch: drop, merged upstream.
    - fixes/angle-wayland: build fix due to mismatched wayland headers
      on sid. Only needed until angle updates its copy of wayland.
    - disable/welcome-page.patch: drop. Upstream fixed the original
      issue some time ago, and this new version finally cleaned up
      the workaround.
    - fixes/connection-message.patch: drop it. I looked at sending this
      upstream, but the original extension doesn't exist any more,
      and chromium properly prints an error if a proxy is unreachable.
      If you can still reproduce the issue (described in
      http://bugs.debian.org/864539), let me know so I can get it fixed
      upstream.
  * debian/scripts/unbundle: upstream tripled the number of (previously
    vendored) libraries that we can use system versions of. However,
    the majority of them are either not in bullseye or are too old, so
    we'll have to wait to use the debian versions for the ones not newly
    added as build-deps.
  * Disable optimize_webui, due to a build failure using nodejs from
    bullseye. I'll reenable this when it either gets fixed or we're done
    with bullseye security support.
  * Remove sse3-support dependency and just refuse to run if SSE3 is
    not present. Breaking via preinst script isn't appropriate for
    packages that might be installed by default (eg, by Debian Edu).
  * debian/control: add build-deps for brotli, libdouble-conversion-dev,
    libwoff-dev, and libxnvctrl-dev (closes: #987292).
  * Rework default search engine stuff. People did not like the "Your
    browser is managed" and "Your administrator can change your browser
    setup remotely" messages, which are admittedly alarming.
    Instead of using /etc/chromium/policies/recommended/duckduckgo.json,
    delete that and use /etc/chromium/master_preferences instead.

 -- Andres Salomon <email address hidden>  Wed, 31 Aug 2022 20:48:11 -0400
Superseded in sid-release
chromium (104.0.5112.101-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-2852: Use after free in FedCM.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2022-2854: Use after free in SwiftShader. Reported by Cassidy
      Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-2855: Use after free in ANGLE. Reported by Cassidy Kim
      of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-2857: Use after free in Blink. Reported by Anonymous
    - CVE-2022-2858: Use after free in Sign-In Flow.
      Reported by raven at KunLun lab
    - CVE-2022-2853: Heap buffer overflow in Downloads.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2022-2856: Insufficient validation of untrusted input in Intents
      Reported by Ashley Shen and Christian Resell of Google Threat
      Analysis Group
    - CVE-2022-2859: Use after free in Chrome OS Shell. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2860: Insufficient policy enforcement in Cookies.
      Reported by Axel Chong
    - CVE-2022-2861: Inappropriate implementation in Extensions API.
      Reported by Rong Jian of VRI
  * Change default search engine to DuckDuckGo for privacy reasons.
    Set a different search engine under Settings -> Search Engine
    (closes: #956012).
  * Drop a bunch of versioned build-deps that have been satisfied
    since at least oldoldstable.
  * debian/NEWS.Debian:
    - Document upstream dropping support for older TLSv1 and TLSv1.1
      protocols (closes: #1005808).
    - Document upstream dropping support for older x86 CPUs without
      SSE3 instruction support (closes: #1010407).
    - Document the Google to DuckDuckGo change.
    - Document upstream's config renaming of AuthServerWhitelist to
      AuthServerAllowlist (closes: #1013268).

 -- Andres Salomon <email address hidden>  Tue, 16 Aug 2022 17:29:29 -0400
Superseded in sid-release
chromium (104.0.5112.79-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-2603: Use after free in Omnibox. Reported by Anonymous
    - CVE-2022-2604: Use after free in Safe Browsing. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2605: Out of bounds read in Dawn. Reported by Looben Yang
    - CVE-2022-2606: Use after free in Managed devices API. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2607: Use after free in Tab Strip. Reported by @ginggilBesel
    - CVE-2022-2608: Use after free in Overview Mode.
      Reported by Khalil Zhani
    - CVE-2022-2609: Use after free in Nearby Share. Reported by koocola
      (@alo_cook) and Guang Gong of 360 Vulnerability Research Institute
    - CVE-2022-2610: Insufficient policy enforcement in Background Fetch.
      Reported by Maurice Dauer
    - CVE-2022-2611: Inappropriate implementation in Fullscreen API.
      Reported by Irvan Kurniawan (sourc7)
    - CVE-2022-2612: Side-channel information leakage in Keyboard input.
      Reported by Erik Kraft (<email address hidden>),
      Martin Schwarzl (<email address hidden>)
    - CVE-2022-2613: Use after free in Input.
      Reported by Piotr Tworek (Vewd)
    - CVE-2022-2614: Use after free in Sign-In Flow.
      Reported by raven at KunLun lab
    - CVE-2022-2615: Insufficient policy enforcement in Cookies.
      Reported by Maurice Dauer
    - CVE-2022-2616: Inappropriate implementation in Extensions API.
      Reported by Alesandro Ortiz
    - CVE-2022-2617: Use after free in Extensions API.
      Reported by @ginggilBesel
    - CVE-2022-2618: Insufficient validation of untrusted input in
      Internals. Reported by asnine
    - CVE-2022-2619: Insufficient validation of untrusted input in Settings.
      Reported by Oliver Dunk
    - CVE-2022-2620: Use after free in WebUI. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2621: Use after free in Extensions.
      Reported by Huyna at Viettel Cyber Security
    - CVE-2022-2622: Insufficient validation of untrusted input in
      Safe Browsing. Reported by Imre Rad (@ImreRad) and @j00sean
    - CVE-2022-2623: Use after free in Offline. Reported by
      raven at KunLun lab
    - CVE-2022-2624: Heap buffer overflow in PDF. Reported by YU-CHANG
      CHEN and CHIH-YEN CHANG, working with DEVCORE Internship Program
  * debian/patches:
    - bullseye/nomerge.patch: drop, was only needed for clang-11.
    - bullseye/clang11.patch: drop clang-11 bits, rename to clang13.patch.
    - bullseye/blink-constexpr.patch: drop, only needed for clang-11.
    - bullseye/byteswap-constexpr2.patch: drop, only needed for clang-11.
    - disable/angle-perftests.patch: refresh
    - disable/catapult.patch: refresh & drop some no longer needed bits.
    - fixes/tflite.patch: fix a build error.
  * debian/copyright:
    - upstream dropped perfetto/ui/src/gen/.

 -- Andres Salomon <email address hidden>  Thu, 04 Aug 2022 11:31:44 -0400
Superseded in sid-release
chromium (103.0.5060.134-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-2477 : Use after free in Guest View. Reported by anonymous
    - CVE-2022-2478 : Use after free in PDF. Reported by triplepwns
    - CVE-2022-2479 : Insufficient validation of untrusted input in File.
      Reported by anonymous
    - CVE-2022-2480 : Use after free in Service Worker API.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2022-2481: Use after free in Views. Reported by
      YoungJoo Lee(@ashuu_lee) of CompSecLab at Seoul National University
    - CVE-2022-2163: Use after free in Cast UI and Toolbar.
      Reported by Chaoyuan Peng (@ret2happy)

 -- Andres Salomon <email address hidden>  Wed, 20 Jul 2022 00:51:39 -0400
Superseded in sid-release
chromium (103.0.5060.114-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-2294: Heap buffer overflow in WebRTC. Reported by
      Jan Vojtesek from the Avast Threat Intelligence team
    - CVE-2022-2295: Type Confusion in V8.
      Reported by avaue and Buff3tts at S.S.L.
    - CVE-2022-2296: Use after free in Chrome OS Shell.
      Reported by Khalil Zhani

 -- Andres Salomon <email address hidden>  Sun, 10 Jul 2022 12:44:03 -0400
Superseded in bullseye-release
chromium (103.0.5060.53-1~deb11u1) bullseye-security; urgency=high

  * New upstream stable release.
    - CVE-2022-2156: Use after free in Base.
      Reported by Mark Brand of Google Project Zero
    - CVE-2022-2157: Use after free in Interest groups. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-2158: Type Confusion in V8. Reported by
      Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu Lab
    - CVE-2022-2160: Insufficient policy enforcement in DevTools.
      Reported by David Erceg
    - CVE-2022-2161: Use after free in WebApp Provider.
      Reported by Zhihua Yao of KunLun Lab
    - CVE-2022-2162: Insufficient policy enforcement in File System API.
      Reported by Abdelhamid Naceri (halov)
    - CVE-2022-2163: Use after free in Cast UI and Toolbar.
      Reported by Chaoyuan Peng (@ret2happy)
    - CVE-2022-2164: Inappropriate implementation in Extensions API.
      Reported by José Miguel Moreno Computer Security Lab (COSEC) at UC3M
    - CVE-2022-2165: Insufficient data validation in URL formatting.
      Reported by Rayyan Bijoora
  * debian/patches:
    - upstream/dawn-version-fix.patch: drop merged upstream.
    - upstream/blink-ftbfs.patch: drop, merged upstream.
    - upstream/libxml.patch: drop, merged upstream.
    - upstream/nested-nested-nested-nested-nested-nested-regex-patterns.patch:
      drop, merged upstream.
    - upstream/byteswap-constexpr.patch: drop, merged upstream.
    - bullseye/byteswap-constexpr2.patch: sys_byteswap.h moved directories.
    - disable/angle-perftests.patch: simple refresh.
    - disable/catapult.patch: simple refresh.
    - bullseye/clang11.patch: minor update for some code dropped upstream.
    - system/openjpeg.patch: update for libopenjp2-7-dev's 2.4 -> 2.5 path
      change.

 -- Andres Salomon <email address hidden>  Tue, 21 Jun 2022 21:40:12 -0400
Superseded in sid-release
chromium (103.0.5060.53-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-2156: Use after free in Base.
      Reported by Mark Brand of Google Project Zero
    - CVE-2022-2157: Use after free in Interest groups. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab 
    - CVE-2022-2158: Type Confusion in V8. Reported by
      Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu Lab
    - CVE-2022-2160: Insufficient policy enforcement in DevTools.
      Reported by David Erceg
    - CVE-2022-2161: Use after free in WebApp Provider.
      Reported by Zhihua Yao of KunLun Lab
    - CVE-2022-2162: Insufficient policy enforcement in File System API.
      Reported by Abdelhamid Naceri (halov)
    - CVE-2022-2163: Use after free in Cast UI and Toolbar.
      Reported by Chaoyuan Peng (@ret2happy)
    - CVE-2022-2164: Inappropriate implementation in Extensions API.
      Reported by José Miguel Moreno Computer Security Lab (COSEC) at UC3M
    - CVE-2022-2165: Insufficient data validation in URL formatting.
      Reported by Rayyan Bijoora
  * debian/patches:
    - upstream/dawn-version-fix.patch: drop merged upstream.
    - upstream/blink-ftbfs.patch: drop, merged upstream.
    - upstream/libxml.patch: drop, merged upstream.
    - upstream/nested-nested-nested-nested-nested-nested-regex-patterns.patch:
      drop, merged upstream.
    - upstream/byteswap-constexpr.patch: drop, merged upstream.
    - bullseye/byteswap-constexpr2.patch: sys_byteswap.h moved directories.
    - disable/angle-perftests.patch: simple refresh.
    - disable/catapult.patch: simple refresh.
    - bullseye/clang11.patch: minor update for some code dropped upstream.
    - system/openjpeg.patch: update for libopenjp2-7-dev's 2.4 -> 2.5 path
      change.

 -- Andres Salomon <email address hidden>  Tue, 21 Jun 2022 02:59:01 +0000
Superseded in sid-release
chromium (102.0.5005.115-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-2007: Use after free in WebGPU. Reported by David Manouchehri
    - CVE-2022-2008: Out of bounds memory access in WebGL.
      Reported by khangkito - Tran Van Khang (VinCSS)
    - CVE-2022-2010: Out of bounds read in compositing.
      Reported by Mark Brand of Google Project Zero
    - CVE-2022-2011: Use after free in ANGLE.
      Reported by SeongHwan Park (SeHwa)
  * debian/patches:
    - bullseye/byteswap-constexpr2.patch - additional fix for bullseye
      builds on 32-bit platforms (closes: #1011096).
    - debianization/support-i386.patch - re-enable support for i386 builds.
      Upstream no longer officially supports i386 builds on linux, so we
      are on our own here.

 -- Andres Salomon <email address hidden>  Fri, 10 Jun 2022 02:37:57 +0000
Superseded in sid-release
chromium (102.0.5005.61-1) unstable; urgency=high

  * New upstream stable release.
    - CVE-2022-1853: Use after free in Indexed DB. Reported by Anonymous
    - CVE-2022-1854: Use after free in ANGLE.
      Reported by SeongHwan Park (SeHwa)
    - CVE-2022-1855: Use after free in Messaging. Reported by Anonymous
    - CVE-2022-1856: Use after free in User Education. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-1857: Insufficient policy enforcement in File System API.
      Reported by Daniel Rhea
    - CVE-2022-1858: Out of bounds read in DevTools. Reported by EllisVlad
    - CVE-2022-1859: Use after free in Performance Manager. Reported by
      Guannan Wang (@Keenan7310) of Tencent Security Xuanwu Lab
    - CVE-2022-1860: Use after free in UI Foundations.
      Reported by @ginggilBesel
    - CVE-2022-1861: Use after free in Sharing. Reported by Khalil Zhani
    - CVE-2022-1862: Inappropriate implementation in Extensions.
      Reported by Alesandro Ortiz
    - CVE-2022-1863: Use after free in Tab Groups. Reported by David Erceg
    - CVE-2022-1864: Use after free in WebApp Installs.
      Reported by Yuntao You (@GraVity0) of Bytedance Wuheng Lab
    - CVE-2022-1865: Use after free in Bookmarks.
      Reported by Rong Jian of VRI
    - CVE-2022-1866: Use after free in Tablet Mode.
      Reported by @ginggilBesel
    - CVE-2022-1867: Insufficient validation of untrusted input in
      Data Transfer. Reported by Michał Bentkowski of Securitum
    - CVE-2022-1868: Inappropriate implementation in Extensions API.
      Reported by Alesandro Ortiz
    - CVE-2022-1869: Type Confusion in V8.
      Reported by Man Yue Mo of GitHub Security Lab
    - CVE-2022-1870: Use after free in App Service. Reported by
      Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-1871: Insufficient policy enforcement in File System API.
      Reported by Thomas Orlita
    - CVE-2022-1872: Insufficient policy enforcement in Extensions API.
      Reported by ChaobinZhang
    - CVE-2022-1873: Insufficient policy enforcement in COOP.
      Reported by NDevTK
    - CVE-2022-1874: Insufficient policy enforcement in Safe Browsing.
      Reported by hjy79425575
    - CVE-2022-1875: Inappropriate implementation in PDF. Reported by NDevTK
    - CVE-2022-1876: Heap buffer overflow in DevTools.
      Reported by @ginggilBesel
  * debian/patches:
    - system/jpeg.patch - straight refresh.
    - disable/swiftshader.patch - straight refresh.
    - disable/swiftshader-2.patch - refresh for upstream dropping of legacy
      swiftshader GL stuff; they now use ANGLE.
    - disable/angle-perftests.patch - refresh.
    - system/jsoncpp.patch - refresh for jsoncpp_no_deprecated_declarations
      argument change.
    - bullseye/clang11.patch - merge cast-call.patch into it, as well as
      dropping additional unsupported clang arguments.
    - bullseye/cast-call.patch - drop.
    - upstream/dawn-version-fix.patch - add patch to deal w/ FTBFS.
    - upstream/blink-ftbfs.patch - another FTBFS patch.
    - upstream/nested-nested-nested-nested-nested-nested-regex-patterns.patch -
      fix a build failure that only happens with clang + GNU's libstdc++.
    - upstream/byteswap-constexpr.patch - add this to fix bullsye builds on
      32-bit platforms (closes: #1011096).
  * Don't build unneccessary dawn build tests.

 -- Andres Salomon <email address hidden>  Wed, 25 May 2022 02:09:10 -0400
Superseded in sid-release
chromium (101.0.4951.64-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-1633: Use after free in Sharesheet. Reported by Khalil Zhani
    - CVE-2022-1634: Use after free in Browser UI. Reported by Khalil Zhani
    - CVE-2022-1635: Use after free in Permission Prompts.
      Reported by Anonymous
    - CVE-2022-1636: Use after free in Performance APIs.
      Reported by Seth Brenith, Microsoft
    - CVE-2022-1637: Inappropriate implementation in Web Contents.
      Reported by Alesandro Ortiz
    - CVE-2022-1638: Heap buffer overflow in V8 Internationalization.
      Reported by DoHyun Lee (@l33d0hyun) of DNSLab, Korea University
    - CVE-2022-1639: Use after free in ANGLE.
      Reported by SeongHwan Park (SeHwa)
    - CVE-2022-1640: Use after free in Sharing. Reported by Weipeng
      Jiang (@Krace) and Guang Gong of 360 Vulnerability Research Institute
    - CVE-2022-1641: Use after free in Web UI Diagnostics.
      Reported by Rong Jian of VRI

 -- Andres Salomon <email address hidden>  Tue, 10 May 2022 21:52:11 -0400
Superseded in sid-release
chromium (101.0.4951.54-1) unstable; urgency=low

  * Depend on sse3-support to ensure that chromium is only installed on
    machines that support the SSE3 instruction set. Otherwise we crash,
    as described in #1010407. We can also remove the manual sse2 check now.
    Upstream describes the SSE3 requirement @ http://crbug.com/1123353
  * New upstream stable release.

 -- Andres Salomon <email address hidden>  Tue, 03 May 2022 12:16:07 -0400
Superseded in sid-release
chromium (101.0.4951.41-2) unstable; urgency=high

  * No changes, just the CVE list. The original blog post *did not*
    have CVEs.  >:(
    - CVE-2022-1477: Use after free in Vulkan.
      Reported by SeongHwan Park (SeHwa)
    - CVE-2022-1478: Use after free in SwiftShader.
      Reported by SeongHwan Park (SeHwa)
    - CVE-2022-1479: Use after free in ANGLE.
      Reported by Jeonghoon Shin of Theori
    - CVE-2022-1480: Use after free in Device API. Reported by @uwu7586
    - CVE-2022-1481: Use after free in Sharing. Reported by Weipeng Jiang
      (@Krace) and Guang Gong of 360 Vulnerability Research Institute
    - CVE-2022-1482: Inappropriate implementation in WebGL.
      Reported by Christoph Diehl, Microsoft
    - CVE-2022-1483: Heap buffer overflow in WebGPU.
      Reported by Mark Brand of Google Project Zero
    - CVE-2022-1484: Heap buffer overflow in Web UI Settings.
      Reported by Chaoyuan Peng (@ret2happy)
    - CVE-2022-1485: Use after free in File System API.
    - CVE-2022-1486: Type Confusion in V8. Reported by Brendon Tiszka
    - CVE-2022-1487: Use after free in Ozone. Reported by Sri
    - CVE-2022-1488: Inappropriate implementation in Extensions API.
      Reported by Thomas Beverley from Wavebox.io
    - CVE-2022-1489: Out of bounds memory access in UI Shelf.
      Reported by Khalil Zhani
    - CVE-2022-1490: Use after free in Browser Switcher.
      Reported by raven at KunLun lab
    - CVE-2022-1491: Use after free in Bookmarks.
      Reported by raven at KunLun lab
    - CVE-2022-1492: Insufficient data validation in Blink Editing.
      Reported by Michał Bentkowski of Securitum
    - CVE-2022-1493: Use after free in Dev Tools.
      Reported by Zhihua Yao of KunLun Lab
    - CVE-2022-1494: Insufficient data validation in Trusted Types.
      Reported by Masato Kinugawa
    - CVE-2022-1495: Incorrect security UI in Downloads.
      Reported by Umar Farooq
    - CVE-2022-1496: Use after free in File Manager. Reported by Zhiyi
      Zhang and Zhunki from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2022-1497: Inappropriate implementation in Input. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2022-1498: Inappropriate implementation in HTML Parser.
      Reported by SeungJu Oh (@real_as3617)
    - CVE-2022-1499: Inappropriate implementation in WebAuthentication.
      Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2022-1500: Insufficient data validation in Dev Tools.
      Reported by Hoang Nguyen
    - CVE-2022-1501: Inappropriate implementation in iframe.
      Reported by Oriol Brufau

 -- Andres Salomon <email address hidden>  Tue, 26 Apr 2022 18:06:08 -0400
Superseded in sid-release
chromium (100.0.4896.127-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-1364: Type Confusion in V8.
      Reported by Clément Lecigne of Google's Threat Analysis Group

 -- Andres Salomon <email address hidden>  Thu, 14 Apr 2022 20:51:15 -0400
Superseded in sid-release
chromium (100.0.4896.88-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-1305: Use after free in storage. Reported by Anonymous
    - CVE-2022-1306: Inappropriate implementation in compositing.
      Reported by Sven Dysthe
    - CVE-2022-1307: Inappropriate implementation in full screen.
      Reported by Irvan Kurniawan (sourc7)
    - CVE-2022-1308: Use after free in BFCache.
      Reported by Samet Bekmezci @sametbekmezci
    - CVE-2022-1309: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2022-1310: Use after free in regular expressions.
      Reported by Brendon Tiszka
    - CVE-2022-1311: Use after free in Chrome OS shell.
      Reported by Nan Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2022-1312: Use after free in storage. Reported by
      Leecraso and Guang Gong of 360 Vulnerability Research Institute
    - CVE-2022-1313: Use after free in tab groups. Reported by Thomas Orlita
    - CVE-2022-1314: Type Confusion in V8.
      Reported by Bohan Liu (@P4nda20371774) of Tencent Security Xuanwu Lab

 -- Andres Salomon <email address hidden>  Mon, 11 Apr 2022 23:45:07 -0400
Superseded in sid-release
chromium (100.0.4896.75-1) unstable; urgency=high

  * debian/copyright:
    - Stop dropping third_party/zlib/contrib/, which is just source code
      with acceptable licenses.
    - Replace the rule that dropped third_party/depot_tools with a more
      specific rule that drops just the ninja binaries. Also delete some
      unused png files to work around a bug in our scripts.
    - Replace a rule that dropped third_party/devtools-frontend/src/test
      with just dropping all wasm files ('*.wasm'), as well as
      third_party/devtools-frontend/src/test/screenshots/image_diff/.
  * debian/patches:
    - upstream/rvo-workaround.patch - added to fix FTBFS w/ clang-11. Pulled
      from upstream git.
    - disable/swiftshader-2.patch - drop most of it that's wrapped in a
      check for windows.
    - disable/fuzzers.patch - drop it; with the last release modifying
      fuzzer inclusion, we can now configure the build without this.
    - disable/owners.patch - drop it; no longer needed with depot_tools
      remaining in the source tree.
    - disable/devtools-unittests.patch - drop it; no longer needed if
      we keep third_party/devtools-frontend/src/test in the source tree.
    - disable/tests.patch - drop half of it; the media/gpu changes aren't
      needed, while keeping stuff in third_party/devtools-frontend/src/test
      from building is still necessary.
  * Drop enable_nacl_nonsfi=false from debian/rules, as upstream got rid
    of the variable.
  * New upstream security release.
    - CVE-2022-1232: Type Confusion in V8.
      Reported by Sergei Glazunov of Google Project Zero.

 -- Andres Salomon <email address hidden>  Wed, 06 Apr 2022 04:24:45 -0400
Superseded in sid-release
chromium (100.0.4896.60-1) unstable; urgency=high

  * Fix debian/watch to find the correct upstream version.
  * Ensure xz uses all available cpu cores when preparing orig.tar.gz
  * Switch to bundled ICU, since Debian's ICU is 2 years old at this point
    and upstream depends on a bunch of new API in ICU 69.1.
  * debian/copyright:
    - ensure all *.dlls are dropped from source.
    - Stop dropping '*fuzz' directories. It was too aggressive, resulting
      in build errors for perfectly fine BSD-3-clause and similar code.
    - Instead, drop '*corpus' and '*corpora' directories. Some of it is
      fine (lots generated by oss-fuzz with .dict files provided), but
      not all of it is and it's easier to just drop it.
    - Drop an esbuild binary.
    - The full upstream tarball includes additional stuff we don't want,
      so drop *.jar, tools/win, and some other stuff in third_party/.
  * debian/rules:
    - Disabling & deleting swiftshader now also needs to add
      dawn_use_swiftshader=false.
    - Switch from -lite upstream tarball to the full tarball in order to
      include ICU sources.
  * debian/patches:
    - upstream/libdrm.patch - drop, merged upstream.
    - debianization/manpage.patch - drop a small chunk merged upstream.
    - system/icu.patch - drop now that we're bundling ICU.
    - bullseye/icu-types.patch - drop now that we're bundling ICU.
    - system/convertutf.patch - update build for bundled ICU path.
    - fixes/closure.patch - drop now that we're no longer using lite tarball.
    - disable/driver-chrome-path.patch - refresh for BUILDFLAG() macro.
    - system/jsoncpp.patch - refresh for unrelated ios change.
    - disable/catapult.patch - refresh due to moving around of .pak files.
  * New upstream stable release.
    - CVE-2022-1125: Use after free in Portals. Reported by Khalil Zhani
    - CVE-2022-1127: Use after free in QR Code Generator.
      Reported by anonymous
    - CVE-2022-1128: Inappropriate implementation in Web Share API.
      Reported by Abdel Adim (@smaury92) Oisfi of Shielder
    - CVE-2022-1129: Inappropriate implementation in Full Screen Mode.
      Reported by Irvan Kurniawan (sourc7)
    - CVE-2022-1130: Insufficient validation of untrusted input in WebOTP.
      Reported by Sergey Toshin of Oversecurity Inc.
    - CVE-2022-1131: Use after free in Cast UI. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2022-1132: Inappropriate implementation in Virtual Keyboard.
      Reported by Andr.Ess
    - CVE-2022-1133: Use after free in WebRTC. Reported by Anonymous
    - CVE-2022-1134: Type Confusion in V8.
      Reported by Man Yue Mo of GitHub Security Lab
    - CVE-2022-1135: Use after free in Shopping Cart.
      Reported by Wei Yuan of MoyunSec VLab
    - CVE-2022-1136: Use after free in Tab Strip . Reported by Krace
    - CVE-2022-1137: Inappropriate implementation in Extensions.
      Reported by Thomas Orlita
    - CVE-2022-1138: Inappropriate implementation in Web Cursor.
      Reported by Alesandro Ortiz
    - CVE-2022-1139: Inappropriate implementation in Background Fetch API.
      Reported by Maurice Dauer
    - CVE-2022-1141: Use after free in File Manager.
      Reported by raven at KunLun lab
    - CVE-2022-1142: Heap buffer overflow in WebUI.
      Reported by Leecraso and Guang Gong of 360 Alpha Lab
    - CVE-2022-1143: Heap buffer overflow in WebUI.
      Reported by Leecraso and Guang Gong of 360 Alpha Lab
    - CVE-2022-1144: Use after free in WebUI.
      Reported by Leecraso and Guang Gong of 360 Alpha Lab
    - CVE-2022-1145: Use after free in Extensions.
      Reported by Yakun Zhang of Baidu Security
    - CVE-2022-1146: Inappropriate implementation in Resource Timing.
      Reported by Sohom Datta

 -- Andres Salomon <email address hidden>  Fri, 01 Apr 2022 15:02:16 -0400
Superseded in sid-release
chromium (99.0.4844.84-1) unstable; urgency=high

  * New upstream security ("just *ONE* security hole, that's it?!") release.
    - CVE-2022-1096: Type Confusion in V8. Reported by anonymous.

 -- Andres Salomon <email address hidden>  Sat, 26 Mar 2022 00:16:52 -0500
Superseded in bullseye-release
chromium (99.0.4844.74-1~deb11u1) bullseye-security; urgency=high

  * New upstream security release.
    - CVE-2022-0971: Use after free in Blink Layout.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0972: Use after free in Extensions.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0973: Use after free in Safe Browsing.
      Reported by avaue and Buff3tts at S.S.L.
    - CVE-2022-0974 : Use after free in Splitscreen.
      Reported by @ginggilBesel.
    - CVE-2022-0975: Use after free in ANGLE.
      Reported by SeongHwan Park (SeHwa).
    - CVE-2022-0976: Heap buffer overflow in GPU. Reported by Omair.
    - CVE-2022-0977: Use after free in Browser UI. Reported by Khalil Zhani.
    - CVE-2022-0978: Use after free in ANGLE. Reported by Cassidy Kim of
      Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0979: Use after free in Safe Browsing. Reported by anonymous.
    - CVE-2022-0980: Use after free in New Tab Page. Reported by Krace.

 -- Andres Salomon <email address hidden>  Wed, 16 Mar 2022 13:51:21 -0500
Superseded in sid-release
chromium (99.0.4844.74-1) unstable; urgency=high

  * New upstream security release.
    - CVE-2022-0971: Use after free in Blink Layout.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0972: Use after free in Extensions.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0973: Use after free in Safe Browsing.
      Reported by avaue and Buff3tts at S.S.L.
    - CVE-2022-0974 : Use after free in Splitscreen.
      Reported by @ginggilBesel.
    - CVE-2022-0975: Use after free in ANGLE.
      Reported by SeongHwan Park (SeHwa).
    - CVE-2022-0976: Heap buffer overflow in GPU. Reported by Omair.
    - CVE-2022-0977: Use after free in Browser UI. Reported by Khalil Zhani.
    - CVE-2022-0978: Use after free in ANGLE. Reported by Cassidy Kim of
      Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0979: Use after free in Safe Browsing. Reported by anonymous.
    - CVE-2022-0980: Use after free in New Tab Page. Reported by Krace.

 -- Andres Salomon <email address hidden>  Wed, 16 Mar 2022 13:30:00 -0500
Superseded in sid-release
chromium (99.0.4844.51-2) unstable; urgency=medium

  * Change dependency on xdg-desktop-portal-* packages to be
    libgtk-3-0|xdg-desktop-portal-backend. Some folks don't want all
    the dependencies of the xdg portal packages, and chromium really just
    requires gtk unless runnning under KDE (closes: #1006267).
  * Disable fieldtrial testing config to fix some sandboxing issues. We
    used to do this, but the config flag was renamed (closes: #1003622).
  * Adjust patches:
    + system/zlib.patch: drop part of it that is unnecessary.

 -- Andres Salomon <email address hidden>  Sun, 06 Mar 2022 12:46:55 -0500
Superseded in sid-release
chromium (99.0.4844.51-1) unstable; urgency=high

  * Embed harfbuzz instead of using the system harfbuzz. Debian doesn't
    yet package harfbuzz-subset (see #988781). Once it is packaged, we
    can go back to using it.
  * Build against Debian's rapidjson-dev package instead of ANGLE's
    bundled rapidjson.
  * Adjust patches:
    + system/harfbuzz.patch - drop, we're using bundled harfbuzz now.
    + upstream/quiche-include.patch - drop, merged upstream.
    + upstream/restrict.patch - drop, merged upstream.
    + upstream/sequence-point.patch - drop, merged upstream.
    + disable/installer.patch - use new BUILDFLAG() macro.
    + disable/unrar.patch - use new BUILDFLAG() macro.
    + disable/welcome-page.patch - use new BUILDFLAG() macro.
    + disable/widevine-cdm.cu.patch - use new BUILDFLAG() macro.
    + disable/tests.patch - drop unnecessary parts of the patch (which ends
      up being most of it).
    + disable/angle-perftests.patch - drop config disabling ANGLE's rapidjson.
    + disable/swiftshader.patch - drop removal of rapidjson dependency.
  * New upstream stable release.
    - CVE-2022-0789: Heap buffer overflow in ANGLE.
      Reported by SeongHwan Park (SeHwa).
    - CVE-2022-0790: Use after free in Cast UI. Reported by Anonymous.
    - CVE-2022-0791: Use after free in Omnibox.
      Reported by Zhihua Yao of KunLun Lab.
    - CVE-2022-0792: Out of bounds read in ANGLE.
      Reported by Jaehun Jeong(@n3sk) of Theori.
    - CVE-2022-0793: Use after free in Views. Reported by Thomas Orlita.
    - CVE-2022-0794: Use after free in WebShare. Reported by Khalil Zhani.
    - CVE-2022-0795: Type Confusion in Blink Layout. Reported by 0x74960.
    - CVE-2022-0796: Use after free in Media. Reported by Cassidy Kim
      of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0797: Out of bounds memory access in Mojo.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0798: Use after free in MediaStream.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-0799: Insufficient policy enforcement in Installer.
      Reported by Abdelhamid Naceri (halov).
    - CVE-2022-0800: Heap buffer overflow in Cast UI.
      Reported by Khalil Zhani.
    - CVE-2022-0801: Inappropriate implementation in HTML parser.
      Reported by Michał Bentkowski of Securitum.
    - CVE-2022-0802: Inappropriate implementation in Full screen mode.
      Reported by Irvan Kurniawan (sourc7).
    - CVE-2022-0803: Inappropriate implementation in Permissions.
      Reported by Abdulla Aldoseri.
    - CVE-2022-0804: Inappropriate implementation in Full screen mode.
      Reported by Irvan Kurniawan (sourc7).
    - CVE-2022-0805: Use after free in Browser Switcher.
      Reported by raven at KunLun Lab.
    - CVE-2022-0806: Data leak in Canvas. Reported by Paril.
    - CVE-2022-0807: Inappropriate implementation in Autofill.
      Reported by Alesandro Ortiz.
    - CVE-2022-0808: Use after free in Chrome OS Shell.
      Reported by @ginggilBesel.
    - CVE-2022-0809: Out of bounds memory access in WebXR.
      Reported by @uwu7586.

 -- Andres Salomon <email address hidden>  Wed, 02 Feb 2022 21:53:14 -0500
Superseded in sid-release
chromium (98.0.4758.102-1) unstable; urgency=high

  * Enable pipewire support in webrtc (closes: #954824).
  * Enable optimize_webui. This UI speed improvement was originally
    disabled due to nodejs deps, but recent upstream changes makes those
    deps necessary either way (closes: #970571).
  * Switch to using bundled node modules, to deal with (frequent) build
    failures (closes: #1005466).
  * Manually depend on xdg-desktop-portal-* packages. The file saving
    dialog needs a UI toolkit (closes: #1005230).
  * New upstream security release.
    - CVE-2022-0603: Use after free in File Manager.
      Reported by Chaoyuan Peng (@ret2happy).
    - CVE-2022-0604: Heap buffer overflow in Tab Groups. Reported by Krace.
    - CVE-2022-0605: Use after free in Webstore API.
      Reported by Thomas Orlita.
    - CVE-2022-0606: Use after free in ANGLE.
    - CVE-2022-0606: Use after free in ANGLE. Reported by Cassidy Kim of
      Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0607: Use after free in GPU. Reported by 0x74960.
    - CVE-2022-0608: Integer overflow in Mojo.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0609: Use after free in Animation. Reported by
      Adam Weidemann and Clément Lecigne of Google's Threat Analysis Group.
    - CVE-2022-0610: Inappropriate implementation in Gamepad API.
      Reported by Anonymous.

 -- Andres Salomon <email address hidden>  Tue, 15 Feb 2022 15:37:54 -0500
Superseded in sid-release
chromium (98.0.4758.80-1) unstable; urgency=high

  * Update manpage for package rename and everyone moving to https.
  * Drop libnpsr4-dev versioned dep.
  * Drop a bunch of patches (changes shouldn't affect chromium users).
    See https://salsa.debian.org/chromium-team/chromium/-/commits/master/
    for the dropped patches.
  * New upstream stable release.
    - CVE-2022-0452: Use after free in Safe Browsing.
      Reported by avaue at S.S.L.
    - CVE-2022-0453: Use after free in Reader Mode.
      Reported by Rong Jian of VRI.
    - CVE-2022-0454: Heap buffer overflow in ANGLE.
      Reported by Seong-Hwan Park (SeHwa).
    - CVE-2022-0455: Inappropriate implementation in Full Screen Mode.
      Reported by Irvan Kurniawan (sourc7).
    - CVE-2022-0456: Use after free in Web Search.
      Reported by Zhihua Yao of KunLun Lab.
    - CVE-2022-0457: Type Confusion in V8. Reported by rax of the Group0x58.
    - CVE-2022-0458: Use after free in Thumbnail Tab Strip.
      Reported by Anonymous.
    - CVE-2022-0459: Use after free in Screen Capture.
      Reported by raven (@raid_akame).
    - CVE-2022-0460: Use after free in Window Dialog. Reported by 0x74960.
    - CVE-2022-0461: Policy bypass in COOP. Reported by NDevTK.
    - CVE-2022-0462: Inappropriate implementation in Scroll.
      Reported by Youssef Sammouda.
    - CVE-2022-0463: Use after free in Accessibility.
      Reported by Zhihua Yao of KunLun Lab.
    - CVE-2022-0464: Use after free in Accessibility.
      Reported by Zhihua Yao of KunLun Lab.
    - CVE-2022-0465: Use after free in Extensions.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-0466: Inappropriate implementation in Extensions Platform.
      Reported by David Erceg.
    - CVE-2022-0467: Inappropriate implementation in Pointer Lock.
      Reported by Alesandro Ortiz.
    - CVE-2022-0468: Use after free in Payments. Reported by Krace.
    - CVE-2022-0469: Use after free in Cast. Reported by Thomas Orlita.
    - CVE-2022-0470: Out of bounds memory access in V8. Reported by Looben Yang.

 -- Andres Salomon <email address hidden>  Sat, 05 Feb 2022 01:12:10 -0500
Superseded in sid-release
chromium (97.0.4692.99-1) unstable; urgency=high

  * Add myself as an uploader.
  * Ack my NMU (closes: #1003440).
  * Remove Riku Voipio from uploaders at the request of the Debian MIA team -
    thanks for all your past work on chromium, Riku! (closes: #1001562)
  * Build-dep on terser | uglifyjs.terser (closes: #1001036).
  * Revert automatic wayland detection for now (closes: #1003689).
    We'll try again in chromium v98 or v99.
  * New upstream stable release.
    - CVE-2022-0289: Use after free in Safe browsing.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0290: Use after free in Site isolation. Reported by
      Brendon Tiszka and Sergei Glazunov of Google Project Zero.
    - CVE-2022-0291: Inappropriate implementation in Storage.
      Reported by Anonymous.
    - CVE-2022-0292: Inappropriate implementation in Fenced Frames.
      Reported by Brendon Tiszka.
    - CVE-2022-0293: Use after free in Web packaging. Reported by
      Rong Jian and Guang Gong of 360 Alpha Lab.
    - CVE-2022-0294: Inappropriate implementation in Push messaging.
      Reported by Rong Jian and Guang Gong of 360 Alpha Lab.
    - CVE-2022-0295: Use after free in Omnibox. Reported by Weipeng Jiang
      (@Krace) and Guang Gong of 360 Vulnerability Research Institute.
    - CVE-2022-0296: Use after free in Printing. Reported by koocola(@alo_cook)
      and Guang Gong of 360 Vulnerability Research Institute.
    - CVE-2022-0297: Use after free in Vulkan. Reported by Cassidy Kim of
      Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0298: Use after free in Scheduling.
      Reported by Yangkang (@dnpushme) of 360 ATA.
    - CVE-2022-0300: Use after free in Text Input Method Editor. Reported by
      Rong Jian and Guang Gong of 360 Alpha Lab.
    - CVE-2022-0301: Heap buffer overflow in DevTools. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research.
    - CVE-2022-0302: Use after free in Omnibox. Reported by Weipeng Jiang
      (@Krace) and Guang Gong of 360 Vulnerability Research Institute.
    - CVE-2022-0303: Race in GPU Watchdog.
      Reported by Yiğit Can YILMAZ (@yilmazcanyigit).
    - CVE-2022-0304: Use after free in Bookmarks. Reported by Rong Jian and
      Guang Gong of 360 Alpha Lab.
    - CVE-2022-0305: Inappropriate implementation in Service Worker API.
      Reported by @uwu7586.
    - CVE-2022-0306: Heap buffer overflow in PDFium.
      Reported by Sergei Glazunov of Google Project Zero.
    - CVE-2022-0307: Use after free in Optimization Guide.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-0308: Use after free in Data Transfer.
      Reported by @ginggilBesel.
    - CVE-2022-0309: Inappropriate implementation in Autofill.
      Reported by Alesandro Ortiz.
    - CVE-2022-0310: Heap buffer overflow in Task Manager.
      Reported by Samet Bekmezci @sametbekmezci.
    - CVE-2022-0311: Heap buffer overflow in Task Manager.
      Reported by Samet Bekmezci @sametbekmezci.

 -- Andres Salomon <email address hidden>  Wed, 19 Jan 2022 23:53:45 -0500
Deleted in experimental-release (Reason: None provided.)
chromium (99.0.4818.0-0.1) experimental; urgency=low

  * Non-maintainer upload.
  * New upstream development release.
  * Build-dep on rapidjson-dev and actually use rapidjson instead of disabling
    it in ANGLE.

 -- Andres Salomon <email address hidden>  Thu, 20 Jan 2022 01:09:01 -0500
Superseded in sid-release
chromium (97.0.4692.71-0.1) unstable; urgency=high

  * Non-maintainer upload.
  * Stop building chromium's bunded gn and instead build-dep on generate-ninja.
  * Drop numerous patches related to gcc building, since we just build w/ clang.
  * Use python3 as default instead of relying on python2
    (closes: #942962, #996375).
  * Enable the ozone backend in the build (closes: #955540).
  * Automatically detect & enable Wayland support when launching chromium
    (closes: #861796).
  * Rename crashpad_handler to chrome_crashpad_handler.
  * No longer hardcode desktop GL implementation as default - it causes
    the chromium compositor's draw buffer to fill up & crash on my system.
  * Enable official builds.
  * New upstream stable release (closes: #995212).
    - CVE-2022-0096: Use after free in Storage. Reported by Yangkang
      (@dnpushme) of 360 ATA
    - CVE-2022-0097: Inappropriate implementation in DevTools. Reported by
      David Erceg
    - CVE-2022-0098: Use after free in Screen Capture. Reported by
      @ginggilBesel
    - CVE-2022-0099: Use after free in Sign-in. Reported by Rox
    - CVE-2022-0100: Heap buffer overflow in Media streams API. Reported by
      Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
      Corp. Ltd.
    - CVE-2022-0101: Heap buffer overflow in Bookmarks. Reported by raven
      (@raid_akame)
    - CVE-2022-0102: Type Confusion in V8. Reported by Brendon Tiszka
    - CVE-2022-0103: Use after free in SwiftShader. Reported by Abraruddin
      Khan and Omair
    - CVE-2022-0104: Heap buffer overflow in ANGLE. Reported by Abraruddin
      Khan and Omair
    - CVE-2022-0105: Use after free in PDF. Reported by Cassidy Kim of Amber
      Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2022-0106: Use after free in Autofill. Reported by Khalil Zhani
    - CVE-2022-0107: Use after free in File Manager API. Reported by raven
      (@raid_akame)
    - CVE-2022-0108: Inappropriate implementation in Navigation. Reported by
      Luan Herrera (@lbherrera_)
    - CVE-2022-0109: Inappropriate implementation in Autofill. Reported by
      Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University
    - CVE-2022-0110: Incorrect security UI in Autofill. Reported by
      Alesandro Ortiz
    - CVE-2022-0111: Inappropriate implementation in Navigation. Reported by
      garygreen
    - CVE-2022-0112: Incorrect security UI in Browser UI. Reported by Thomas
      Orlita
    - CVE-2022-0113: Inappropriate implementation in Blink. Reported by Luan
      Herrera (@lbherrera_)
    - CVE-2022-0114: Out of bounds memory access in Web Serial. Reported by
      Looben Yang
    - CVE-2022-0115: Uninitialized Use in File API. Reported by Mark Brand
      of Google Project Zero
    - CVE-2022-0116: Inappropriate implementation in Compositing. Reported
      by Irvan Kurniawan (sourc7)
    - CVE-2022-0117: Policy bypass in Service Workers. Reported by
      Dongsung Kim (@kid1ng)
    - CVE-2022-0118: Inappropriate implementation in WebShare. Reported by
      Alesandro Ortiz
    - CVE-2022-0120: Inappropriate implementation in Passwords. Reported by
      CHAKRAVARTHI (Ruler96)
    (96.0.4664.110)
    - CVE-2021-4098: Insufficient data validation in Mojo. Reported by
      Sergei Glazunov of Google Project Zero
    - CVE-2021-4099: Use after free in Swiftshader. Reported by Aki Helin
      of Solita
    - CVE-2021-4100: Object lifecycle issue in ANGLE. Reported by Aki Helin
      of Solita
    - CVE-2021-4101: Heap buffer overflow in Swiftshader. Reported by
      Abraruddin Khan and Omair
    - CVE-2021-4102: Use after free in V8. Reported by Anonymous
    (96.0.4664.93)
    - CVE-2021-4052: Use after free in web apps. Reported by Wei Yuan of
      MoyunSec VLab
    - CVE-2021-4053: Use after free in UI. Reported by Rox
    - CVE-2021-4079: Out of bounds write in WebRTC. Reported by Brendon
      Tiszka
    - CVE-2021-4054: Incorrect security UI in autofill. Reported by
      Alesandro Ortiz
    - CVE-2021-4078: Type confusion in V8. Reported by Nan
      Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
    - CVE-2021-4055: Heap buffer overflow in extensions. Reported by Chen
      Rong
    - CVE-2021-4056: Type Confusion in loader. Reported by @__R0ng of 360
      Alpha Lab
    - CVE-2021-4057: Use after free in file API. Reported by Sergei
      Glazunov of Google Project Zero
    - CVE-2021-4058: Heap buffer overflow in ANGLE. Reported by Abraruddin
      Khan and Omair
    - CVE-2021-4059: Insufficient data validation in loader. Reported by
      Luan Herrera (@lbherrera_)
    - CVE-2021-4061: Type Confusion in V8. Reported by Paolo Severini
    - CVE-2021-4062: Heap buffer overflow in BFCache. Reported by Leecraso
      and Guang Gong of 360 Alpha Lab
    - CVE-2021-4063: Use after free in developer tools. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-4064: Use after free in screen capture. Reported by
      @ginggilBesel
    - CVE-2021-4065: Use after free in autofill. Reported by 5n1p3r0010
      from Topsec ChiXiao Lab
    - CVE-2021-4066: Integer underflow in ANGLE. Reported by Jaehun
      Jeong(@n3sk) of Theori
    - CVE-2021-4067: Use after free in window manager. Reported by
      @ginggilBesel
    - CVE-2021-4068: Insufficient validation of untrusted input in new tab
      page. Reported by NDevTK
    (96.0.4664.45)
    - CVE-2021-38008: Use after free in media. Reported by Marcin Towalski
    - CVE-2021-38009: Inappropriate implementation in cache.
      Reported by Luan Herrera (@lbherrera_)
    - CVE-2021-38006: Use after free in storage foundation.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2021-38007: Type Confusion in V8. Reported by Polaris Feng and
      SGFvamll at Singular Security Lab
    - CVE-2021-38005: Use after free in loader.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2021-38010: Inappropriate implementation in service workers.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2021-38011: Use after free in storage foundation.
      Reported by Sergei Glazunov of Google Project Zero
    - CVE-2021-38012: Type Confusion in V8. Reported by Yonghwi Jin (@jinmo123)
    - CVE-2021-38013: Heap buffer overflow in fingerprint recognition.
      Reported by raven (@raid_akame)
    - CVE-2021-38014: Out of bounds write in Swiftshader.
      Reported by Atte Kettunen of OUSPG
    - CVE-2021-38015: Inappropriate implementation in input.
      Reported by David Erceg
    - CVE-2021-38016: Insufficient policy enforcement in background fetch.
      Reported by Maurice Dauer
    - CVE-2021-38017: Insufficient policy enforcement in iframe sandbox.
      Reported by NDevTK
    - CVE-2021-38018: Inappropriate implementation in navigation.
      Reported by Alesandro Ortiz
    - CVE-2021-38019: Insufficient policy enforcement in CORS.
      Reported by Maurice Dauer
    - CVE-2021-38020: Insufficient policy enforcement in contacts picker.
      Reported by Luan Herrera (@lbherrera_)
    - CVE-2021-38021: Inappropriate implementation in referrer.
      Reported by Prakash (@1lastBr3ath)
    - CVE-2021-38022: Inappropriate implementation in WebAuthentication.
      Reported by Michal Kepkowski
    (95.0.4638.69)
    - CVE-2021-37997: Use after free in Sign-In. Reported by Wei Yuan of
      MoyunSec VLab
    - CVE-2021-37998: Use after free in Garbage Collection. Reported by
      Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
      Corp. Ltd.
    - CVE-2021-37999: Insufficient data validation in New Tab Page.
      Reported by Ashish Arun Dhone
    - CVE-2021-38000: Insufficient validation of untrusted input in Intents.
      Reported by Clement Lecigne, Neel Mehta, and Maddie Stone of Google
      Threat Analysis Group
    - CVE-2021-38001: Type Confusion in V8. Reported by @s0rrymybad of
      Kunlun Lab via Tianfu Cup
    - CVE-2021-38002: Use after free in Web Transport. Reported by @__R0ng
      of 360 Alpha Lab, 漏洞研究院青训队 via Tianfu Cup
    - CVE-2021-38003: Inappropriate implementation in V8. Reported by Clément
      Lecigne from Google TAG and Samuel Groß from Google Project Zero
    - CVE-2021-38004: Insufficient policy enforcement in Autofill. Reported
      by Mark Amery
    (95.0.4638.54)
    - CVE-2021-37981: Heap buffer overflow in Skia. Reported by Yangkang
      (@dnpushme) of 360 ATA
    - CVE-2021-37982: Use after free in Incognito. Reported by Weipeng Jiang
      (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-37983: Use after free in Dev Tools. Reported by Zhihua Yao
      of KunLun Lab
    - CVE-2021-37984: Heap buffer overflow in PDFium. Reported by Antti
      Levomäki, Joonas Pihlaja and Christian Jalio from Forcepoint
    - CVE-2021-37985: Use after free in V8. Reported by Yangkang (@dnpushme)
      of 360 ATA
    - CVE-2021-37986: Heap buffer overflow in Settings.
      Reported by raven (@raid_akame)
    - CVE-2021-37987: Use after free in Network APIs. Reported by
      Yangkang (@dnpushme) of 360 ATA
    - CVE-2021-37988: Use after free in Profiles. Reported by raven
     (@raid_akame)
    - CVE-2021-37989: Inappropriate implementation in Blink.
      Reported by Matt Dyas, Ankur Sundara
    - CVE-2021-37990: Inappropriate implementation in WebView. Reported by
      Kareem Selim of CyShield
    - CVE-2021-37991: Race in V8. Reported by Samuel Groß of Google Project
      Zero
    - CVE-2021-37992: Out of bounds read in WebAudio. Reported by
      sunburst@Ant Security Light-Year Lab
    - CVE-2021-37993: Use after free in PDF Accessibility. Reported by Cassidy
      Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
    - CVE-2021-37996: Insufficient validation of untrusted input in Downloads.
      Reported by Anonymous
    - CVE-2021-37994: Inappropriate implementation in iFrame Sandbox.
      Reported by David Erceg
    - CVE-2021-37995: Inappropriate implementation in WebApp Installer.
      Reported by Terence Eden
    (94.0.4606.81)
    - CVE-2021-37977: Use after free in Garbage Collection. Reported by
      Anonymous
    - CVE-2021-37978: Heap buffer overflow in Blink. Reported by Yangkang
      (@dnpushme) of 360 ATA
    - CVE-2021-37979: Heap buffer overflow in WebRTC. Reported by Marcin
      Towalski of Cisco Talos
    - CVE-2021-37980: Inappropriate implementation in Sandbox. Reported by
      Yonghwi Jin (@jinmo123) of Theori
    (94.0.4606.71)
    - CVE-2021-37974: Use after free in Safe Browsing. Reported by Weipeng
      Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-37975: Use after free in V8. Reported by Anonymous
    - CVE-2021-37976: Information leak in core. Reported by Clément Lecigne
      from Google TAG, with technical assistance from Sergei Glazunov and
      Mark Brand from Google Project Zero
    (94.0.4606.61)
    - CVE-2021-37973: Use after free in Portals. Reported by Clément Lecigne
      from Google TAG, with technical assistance from Sergei Glazunov and
      Mark Brand from Google Project Zero
    (94.0.4606.54)
    - CVE-2021-37956 Use after free in Offline use. Reported by Huyna at
      Viettel Cyber Security
    - CVE-2021-37957: Use after free in WebGPU. Reported by Looben Yang
    - CVE-2021-37958: Inappropriate implementation in Navigation. Reported by
      James Lee (@Windowsrcer)
    - CVE-2021-37959: Use after free in Task Manager. Reported by raven
      (@raid_akame)
    - CVE-2021-37961: Use after free in Tab Strip. Reported by Khalil Zhani
    - CVE-2021-37962: Use after free in Performance Manager. Reported by Sri
    - CVE-2021-37963: Side-channel information leakage in DevTools. Reported
      by Daniel Genkin and Ayush Agarwal, University of Michigan, Eyal Ronen
      and Shaked Yehezkel, Tel Aviv University, Sioli O’Connell, University of
      Adelaide, and Jason Kim, Georgia Institute of Technology
    - CVE-2021-37964: Inappropriate implementation in ChromeOS Networking.
      Reported by Hugo Hue and Sze Yiu Chau of the Chinese University of Hong
      Kong
    - CVE-2021-37965: Inappropriate implementation in Background Fetch API.
      Reported by Maurice Dauer
    - CVE-2021-37966: Inappropriate implementation in Compositing. Reported by
      Mohit Raj (shadow2639)
    - CVE-2021-37967: Inappropriate implementation in Background Fetch API.
      Reported by SorryMybad (@S0rryMybad) of Kunlun Lab
    - CVE-2021-37968: Inappropriate implementation in Background Fetch API.
      Reported by Maurice Dauer
    - CVE-2021-37969: Inappropriate implementation in Google Updater. Reported
      by Abdelhamid Naceri (halov)
    - CVE-2021-37970: Use after free in File System API. Reported by
      SorryMybad (@S0rryMybad) of Kunlun Lab
    - CVE-2021-37971: Incorrect security UI in Web Browser UI. Reported by
      Rayyan Bijoora
    - CVE-2021-37972: Out of bounds read in libjpeg-turbo. Reported by Xu
      Hanyu and Lu Yutao from Panguite-Forensics-Lab of Qianxin

 -- Andres Salomon <email address hidden>  Mon, 10 Jan 2022 01:38:13 -0500
Superseded in sid-release
chromium (93.0.4577.82-1) unstable; urgency=medium

  * New upstream stable release.
    - CVE-2021-30625: Use after free in Selection API. Reported by Marcin
      Towalski of Cisco Talos
    - CVE-2021-30626: Out of bounds memory access in ANGLE. Reported by
      Jeonghoon Shin of Theori
    - CVE-2021-30627: Type Confusion in Blink layout. Reported by Aki Helin of
      OUSPG
    - CVE-2021-30628: Stack buffer overflow in ANGLE. Reported by Jaehun Jeong
      @n3sk of Theori
    - CVE-2021-30629: Use after free in Permissions. Reported by Weipeng Jiang
      @Krace from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-30630: Inappropriate implementation in Blink . Reported by
      SorryMybad @S0rryMybad of Kunlun Lab
    - CVE-2021-30631: Type Confusion in Blink layout. Reported by Atte Kettunen
      of OUSPG
    - CVE-2021-30632: Out of bounds write in V8. Reported by Anonymous
    - CVE-2021-30633: Use after free in Indexed DB API. Reported by Anonymous
    - CVE-2021-30606: Use after free in Blink. Reported by Nan Wang
      @eternalsakura13 and koocola @alo_cook of 360 Alpha Lab
    - CVE-2021-30607: Use after free in Permissions. Reported by Weipeng Jiang
      @Krace from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-30608: Use after free in Web Share. Reported by Huyna at Viettel
      Cyber Security
    - CVE-2021-30609: Use after free in Sign-In. Reported by raven @raid_akame
    - CVE-2021-30610: Use after free in Extensions API. Reported by Igor
      Bukanov from Vivaldi
    - CVE-2021-30611: Use after free in WebRTC. Reported by Nan Wang
      @eternalsakura13 and koocola @alo_cook of 360 Alpha Lab
    - CVE-2021-30612: Use after free in WebRTC. Reported by Nan Wang
      @eternalsakura13 and koocola @alo_cook of 360 Alpha Lab
    - CVE-2021-30613: Use after free in Base internals. Reported by Yangkang
      @dnpushme of 360 ATA
    - CVE-2021-30614: Heap buffer overflow in TabStrip. Reported by Huinian
      Yang @vmth6 of Amber Security Lab, OPPO Mobile Telecommunications Corp.
      Ltd. 
    - CVE-2021-30615: Cross-origin data leak in Navigation. Reported by NDevTK
    - CVE-2021-30616: Use after free in Media. Reported by Anonymous
    - CVE-2021-30617: Policy bypass in Blink. Reported by NDevTK
    - CVE-2021-30618: Inappropriate implementation in DevTools. Reported by
      @DanAmodio and @mattaustin from Contrast Security
    - CVE-2021-30619: UI Spoofing in Autofill. Reported by Alesandro Ortiz
    - CVE-2021-30620: Insufficient policy enforcement in Blink. Reported by Jun
      Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2021-30621: UI Spoofing in Autofill. Reported by Abdulrahman
      Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-30622: Use after free in WebApp Installs. Reported by Jun
      Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2021-30623: Use after free in Bookmarks. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-30624: Use after free in Autofill. Reported by Wei Yuan of
      MoyunSec VLab
    - CVE-2021-30598: Type Confusion in V8. Reported by Manfred Paul
    - CVE-2021-30599: Type Confusion in V8. Reported by Manfred Paul
    - CVE-2021-30600: Use after free in Printing. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-30601: Use after free in Extensions API. Reported by koocola
      @alo_cook and Nan Wang @eternalsakura13 of 360 Alpha Lab
    - CVE-2021-30602: Use after free in WebRTC. Reported by Marcin Towalski of
      Cisco Talos 
    - CVE-2021-30603: Race in WebAudio. Reported by Sergei Glazunov of Google
      Project Zero
    - CVE-2021-30604: Use after free in ANGLE. Reported by Seong-Hwan Park
      SeHwa of SecunologyLab
    - CVE-2021-30554: Use after free in WebGL. Reported by anonymous
    - CVE-2021-30555: Use after free in Sharing. Reported by David Erceg
    - CVE-2021-30556: Use after free in WebAudio. Reported by Yangkang
      @dnpushme of 360 ATA
    - CVE-2021-30557: Use after free in TabGroups. Reported by David Erceg
    - CVE-2021-30544: Use after free in BFCache. Reported by Rong Jian and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-30545: Use after free in Extensions. Reported by kkwon with
      everpall and kkomdal
    - CVE-2021-30546: Use after free in Autofill. Reported by Abdulrahman
      Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-30547: Out of bounds write in ANGLE. Reported by Seong-Hwan Park
      SeHwa of SecunologyLab
    - CVE-2021-30548: Use after free in Loader. Reported by Yangkang @dnpushme
      & Wanglu of Qihoo360 Qex Team
    - CVE-2021-30549: Use after free in Spell check. Reported by David Erceg
    - CVE-2021-30550: Use after free in Accessibility. Reported by David Erceg
    - CVE-2021-30551: Type Confusion in V8. Reported by Clement Lecigne of
      Google's Threat Analysis Group and Sergei Glazunov of Google Project Zero
    - CVE-2021-30552: Use after free in Extensions. Reported by David Erceg
    - CVE-2021-30553: Use after free in Network service. Reported by Anonymous
    - CVE-2021-30521: Heap buffer overflow in Autofill. Reported by ZhanJia
      Song
    - CVE-2021-30522: Use after free in WebAudio. Reported by Piotr Bania of
      Cisco Talos
    - CVE-2021-30523: Use after free in WebRTC. Reported by Tolyan Korniltsev
    - CVE-2021-30524: Use after free in TabStrip. Reported by David Erceg
    - CVE-2021-30525: Use after free in TabGroups. Reported by David Erceg
    - CVE-2021-30526: Out of bounds write in TabStrip. Reported by David Erceg
    - CVE-2021-30527: Use after free in WebUI. Reported by David Erceg
    - CVE-2021-30528: Use after free in WebAuthentication. Reported by Man Yue
      Mo of GitHub Security Lab
    - CVE-2021-30529: Use after free in Bookmarks. Reported by koocola
      @alo_cook and Nan Wang @eternalsakura13 of 360 Alpha Lab
    - CVE-2021-30530: Out of bounds memory access in WebAudio. Reported by
      kkwon
    - CVE-2021-30531: Insufficient policy enforcement in Content Security
      Policy. Reported by Philip Papurt
    - CVE-2021-30532: Insufficient policy enforcement in Content Security
      Policy. Reported by Philip Papurt
    - CVE-2021-30533: Insufficient policy enforcement in PopupBlocker. Reported
      by Eliya Stein
    - CVE-2021-30534: Insufficient policy enforcement in iFrameSandbox.
      Reported by Alesandro Ortiz
    - CVE-2021-30535: Double free in ICU. Reported by nocma, leogan, cheneyxu
      of WeChat Open Platform Security Team
    - CVE-2021-21212: Insufficient data validation in networking. Reported by
      Hugo Hue and Sze Yiu Chau of the Chinese University of Hong Kong
    - CVE-2021-30536: Out of bounds read in V8. Reported by Chris Salls @salls
    - CVE-2021-30537: Insufficient policy enforcement in cookies. Reported by
      Jun Kokatsu @shhnjk
    - CVE-2021-30538: Insufficient policy enforcement in content security
      policy. Reported by Tianze Ding @D1iv3 of Tencent Security Xuanwu Lab
    - CVE-2021-30539: Insufficient policy enforcement in content security
      policy. Reported by unnamed researcher
    - CVE-2021-30540: Incorrect security UI in payments. Reported by
      @retsew0x01

 -- Michel Le Bihan <email address hidden>  Thu, 16 Sep 2021 17:48:15 +0200
Published in buster-release
chromium (89.0.4389.114-1~deb10u1) buster-security; urgency=medium

  * New upstream security release.
    - CVE-2021-21159: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21160: Heap buffer overflow in WebAudio. Reported by Marcin
      'Icewall' Noga of Cisco Talos
    - CVE-2021-21161: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21162: Use after free in WebRTC. Reported by Anonymous
    - CVE-2021-21163: Insufficient data validation in Reader Mode. Reported by
      Alison Huffman
    - CVE-2021-21165: Object lifecycle issue in audio. Reported by Alison
      Huffman
    - CVE-2021-21166: Object lifecycle issue in audio. Reported by Alison
      Huffman
    - CVE-2021-21167: Use after free in bookmarks. Reported by Leecraso and
      Guang Gong
    - CVE-2021-21168: Insufficient policy enforcement in appcache. Reported by
      Luan Herrera
    - CVE-2021-21169: Out of bounds memory access in V8. Reported by Bohan Liu
      and Moon Liang
    - CVE-2021-21170: Incorrect security UI in Loader. Reported by David Erceg
    - CVE-2021-21171: Incorrect security UI in TabStrip and Navigation.
      Reported by Irvan Kurniawan
    - CVE-2021-21172: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski
    - CVE-2021-21173: Side-channel information leakage in Network Internals.
      Reported by Tom Van Goethem
    - CVE-2021-21174: Inappropriate implementation in Referrer. Reported by
      Ashish Gautam Kamble
    - CVE-2021-21175: Inappropriate implementation in Site isolation. Reported
      by Jun Kokatsu
    - CVE-2021-21176: Inappropriate implementation in full screen mode.
      Reported by Luan Herrera
    - CVE-2021-21177: Insufficient policy enforcement in Autofill. Reported by
      Abdulrahman Alqabandi
    - CVE-2021-21178: Inappropriate implementation in Compositing. Reported by
      Japong
    - CVE-2021-21179: Use after free in Network Internals. Reported by
      Anonymous
    - CVE-2021-21180: Use after free in tab search. Reported by Abdulrahman
      Alqabandi
    - CVE-2021-21181: Side-channel information leakage in autofill. Reported by
      Xu Lin, Panagiotis Ilias, Jason Polakis
    - CVE-2021-21182: Insufficient policy enforcement in navigations. Reported
      by Luan Herrera
    - CVE-2021-21183: Inappropriate implementation in performance APIs.
      Reported by Takashi Yoneuchi
    - CVE-2021-21184: Inappropriate implementation in performance APIs.
      Reported by James Hartig
    - CVE-2021-21185: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2021-21186: Insufficient policy enforcement in QR scanning. Reported
      by dhirajkumarnifty
    - CVE-2021-21187: Insufficient data validation in URL formatting. Reported
      by Kirtikumar Anandrao Ramchandani
    - CVE-2021-21188: Use after free in Blink. Reported by Woojin Oh
    - CVE-2021-21189: Insufficient policy enforcement in payments. Reported by
      Khalil Zhani
    - CVE-2021-21190: Uninitialized Use in PDFium. Reported by Zhou Aiting
    - CVE-2021-21191: Use after free in WebRTC. Reported by raven
    - CVE-2021-21192: Heap buffer overflow in tab groups. Reported by
      Abdulrahman Alqabandi
    - CVE-2021-21193: Use after free in Blink. Reported by Anonymous
    - CVE-2021-21194: Use after free in screen capture. Reported by Leecraso
      and Guang Gong
    - CVE-2021-21195: Use after free in V8. Reported by Liu and Liang
    - CVE-2021-21196: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21197: Heap buffer overflow in TabStrip. Reported by Abdulrahman
      Alqabandi
    - CVE-2021-21198: Out of bounds read in IPC. Reported by Mark Brand
    - CVE-2021-21199: Use Use after free in Aura. Reported by Weipeng Jiang

 -- Michael Gilbert <email address hidden>  Sun, 04 Apr 2021 13:39:43 +0000
Superseded in bullseye-release
Superseded in sid-release
chromium (90.0.4430.212-1) unstable; urgency=medium

  * New upstream security release.
    - CVE-2021-30506: Incorrect security UI in Web App Installs. Reported by
      @retsew0x01
    - CVE-2021-30507: Inappropriate implementation in Offline. Reported by
      Alison Huffman
    - CVE-2021-30508: Heap buffer overflow in Media Feeds. Reported by Leecraso
      and Guang Gong
    - CVE-2021-30509: Out of bounds write in Tab Strip. Reported by David Erceg
    - CVE-2021-30510: Race in Aura. Reported by Weipeng Jiang
    - CVE-2021-30511: Out of bounds read in Tab Groups. Reported by David Erceg
    - CVE-2021-30512: Use after free in Notifications. Reported by ZhanJia Song
    - CVE-2021-30513: Type Confusion in V8. Reported by Man Yue Mo
    - CVE-2021-30514: Use after free in Autofill. Reported by koocola and Wang
    - CVE-2021-30515: Use after free in File API. Reported by Rong Jian and
      Guang Gong
    - CVE-2021-30516: Heap buffer overflow in History. Reported by ZhanJia Song
    - CVE-2021-30517: Type Confusion in V8. Reported by laural
    - CVE-2021-30518: Heap buffer overflow in Reader Mode. Reported by Jun
      Kokatsu
    - CVE-2021-30519: Use after free in Payments. Reported by asnine
    - CVE-2021-30520: Use after free in Tab Strip. Reported by Khalil Zhani

 -- Michael Gilbert <email address hidden>  Thu, 13 May 2021 02:50:43 +0000
Superseded in sid-release
chromium (90.0.4430.93-1) unstable; urgency=medium

  * New upstream security release (closes: #987715).
    - CVE-2021-21227: Insufficient data validation in V8. Reported by Gengming Liu of Singular Security Lab
    - CVE-2021-21232: Use after free in Dev Tools. Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-21233: Heap buffer overflow in ANGLE. Reported by Omair
    - CVE-2021-21228: Insufficient policy enforcement in extensions. Reported by Rob Wu
    - CVE-2021-21229: Incorrect security UI in downloads. Reported by Mohit Raj (shadow2639)
    - CVE-2021-21230: Type Confusion in V8. Reported by Manfred Paul
    - CVE-2021-21231: Insufficient data validation in V8. Reported by Sergei Glazunov of Google Project Zero
  * Disable libaom on arm to potentially fix FTBFS on armhf

 -- Michel Le Bihan <email address hidden>  Wed, 28 Apr 2021 12:15:32 +0200
Superseded in sid-release
chromium (90.0.4430.85-1) unstable; urgency=medium

  * New upstream security release (closes: #987358).
    - CVE-2021-21222: Heap buffer overflow in V8. Reported by Guang Gong of
      Alpha Lab, Qihoo 360
    - CVE-2021-21223: Integer overflow in Mojo. Reported by Guang Gong of Alpha
      Lab, Qihoo 360
    - CVE-2021-21224: Type Confusion in V8. Reported by Jose Martinez tr0y4
      from VerSprite Inc.
    - CVE-2021-21225: Out of bounds memory access in V8. Reported by Brendon
      Tiszka @btiszka supporting the EFF
    - CVE-2021-21226: Use after free in navigation. Reported by Brendon Tiszka
      @btiszka supporting the EFF

 -- Michel Le Bihan <email address hidden>  Thu, 22 Apr 2021 13:01:41 +0200
Superseded in sid-release
chromium (90.0.4430.72-1) unstable; urgency=medium

  * New upstream security release (closes: #987053).
    - CVE-2021-21201: Use after free in permissions. Reported by Gengming Liu
      and Jianyu Chen when working at Tencent KeenLab
    - CVE-2021-21202: Use after free in extensions. Reported by David Erceg
    - CVE-2021-21203: Use after free in Blink. Reported by asnine
    - CVE-2021-21204: Use after free in Blink. Reported by Chelse Tsai-Simek,
      Jeanette Ulloa, and Emily Voigtlander of Seesaw
    - CVE-2021-21205: Insufficient policy enforcement in navigation. Reported
      by Alison Huffman, Microsoft Browser Vulnerability Research
    - CVE-2021-21221: Insufficient validation of untrusted input in Mojo.
      Reported by Guang Gong of Alpha Lab, Qihoo 360
    - CVE-2021-21207: Use after free in IndexedDB. Reported by koocola
      @alo_cook and Nan Wang @eternalsakura13 of 360 Alpha Lab
    - CVE-2021-21208: Insufficient data validation in QR scanner. Reported by
      Ahmed Elsobky @0xsobky
    - CVE-2021-21209: Inappropriate implementation in storage. Reported by Tom
      Van Goethem @tomvangoethem
    - CVE-2021-21210: Inappropriate implementation in Network. Reported by
      @bananabr
    - CVE-2021-21211: Inappropriate implementation in Navigation. Reported by
      Akash Labade m0ns7er
    - CVE-2021-21212: Incorrect security UI in Network Config UI. Reported by
      Hugo Hue and Sze Yiu Chau of the Chinese University of Hong Kong
    - CVE-2021-21213: Use after free in WebMIDI. Reported by raven
      @raid_akame
    - CVE-2021-21214: Use after free in Network API. Reported by Anonymous
    - CVE-2021-21215: Inappropriate implementation in Autofill. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-21216: Inappropriate implementation in Autofill. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-21217: Uninitialized Use in PDFium. Reported by Zhou Aiting
      @zhouat1 of Qihoo 360 Vulcan Team
    - CVE-2021-21218: Uninitialized Use in PDFium. Reported by Zhou Aiting
      @zhouat1 of Qihoo 360 Vulcan Team
    - CVE-2021-21219: Uninitialized Use in PDFium. Reported by Zhou Aiting
      @zhouat1 of Qihoo 360 Vulcan Team

 -- Michel Le Bihan <email address hidden>  Mon, 19 Apr 2021 19:13:47 +0200
Superseded in sid-release
chromium (89.0.4389.114-1) unstable; urgency=medium

  * New upstream security release (closes: #986335).
    - CVE-2021-21194: Use after free in screen capture. Reported by Leecraso
      and Guang Gong
    - CVE-2021-21195: Use after free in V8. Reported by Liu and Liang
    - CVE-2021-21196: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21197: Heap buffer overflow in TabStrip. Reported by Abdulrahman
      Alqabandi
    - CVE-2021-21198: Out of bounds read in IPC. Reported by Mark Brand
    - CVE-2021-21199: Use Use after free in Aura. Reported by Weipeng Jiang

 -- Michael Gilbert <email address hidden>  Sun, 04 Apr 2021 00:34:12 +0000
Superseded in buster-release
chromium (88.0.4324.182-1~deb10u1) buster-security; urgency=medium

  * New upstream security release.
    - CVE-2021-21148: Heap buffer overflow in V8. Reported by Mattias Buelens
    - CVE-2021-21149: Stack overflow in Data Transfer. Reported by Ryoya
      Tsukasaki
    - CVE-2021-21150: Use after free in Downloads. Reported by Woojin Oh
    - CVE-2021-21151: Use after free in Payments. Reported by Khalil Zhani
    - CVE-2021-21152: Heap buffer overflow in Media. Reported by Anonymous
    - CVE-2021-21153: Stack overflow in GPU Process. Reported by Jan Ruge
    - CVE-2021-21154: Heap buffer overflow in Tab Strip . Reported by
      Abdulrahman Alqabandi
    - CVE-2021-21155: Heap buffer overflow in Tab Strip . Reported by Khalil
      Zhani
    - CVE-2021-21156: Heap buffer overflow in V8. Reported by Sergei Glazunov
    - CVE-2021-21157: Use after free in Web Sockets. Reported by Anonymous

 -- Michael Gilbert <email address hidden>  Thu, 18 Feb 2021 15:04:44 +0000
Superseded in sid-release
chromium (89.0.4389.90-1) unstable; urgency=medium

  * New upstream security release (closes: #985271).
    - CVE-2021-21191: Use after free in WebRTC. Reported by raven @raid_akame
    - CVE-2021-21192: Heap buffer overflow in tab groups. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-21193: Use after free in Blink. Reported by Anonymous
      (closes: #985142)
  * Fix build with libvpx 1.7.0 and libicu63 (closes: #984926).
  * Change debian/rules to not leave debian/scripts/mk-origtargz

 -- Michel Le Bihan <email address hidden>  Mon, 15 Mar 2021 12:57:00 +0100
Superseded in sid-release
chromium (89.0.4389.82-1) unstable; urgency=medium

  * New upstream stable release (closes: #984532).
    - CVE-2021-21159: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21160: Heap buffer overflow in WebAudio. Reported by Marcin
      'Icewall' Noga of Cisco Talos
    - CVE-2021-21161: Heap buffer overflow in TabStrip. Reported by Khalil
      Zhani
    - CVE-2021-21162: Use after free in WebRTC. Reported by Anonymous
    - CVE-2021-21163: Insufficient data validation in Reader Mode. Reported by
      Alison Huffman, Microsoft Browser Vulnerability Research
    - CVE-2021-21164: Insufficient data validation in Chrome for iOS. Reported
      by Muneaki Nishimura nishimunea
    - CVE-2021-21165: Object lifecycle issue in audio. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
    - CVE-2021-21166: Object lifecycle issue in audio. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
    - CVE-2021-21167: Use after free in bookmarks. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21168: Insufficient policy enforcement in appcache. Reported by
      Luan Herrera @lbherrera_
    - CVE-2021-21169: Out of bounds memory access in V8. Reported by Bohan Liu
      @P4nda20371774 and Moon Liang of Tencent Security Xuanwu Lab
    - CVE-2021-21170: Incorrect security UI in Loader. Reported by David Erceg
    - CVE-2021-21171: Incorrect security UI in TabStrip and Navigation.
      Reported by Irvan Kurniawan sourc7
    - CVE-2021-21172: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski
    - CVE-2021-21173: Side-channel information leakage in Network Internals.
      Reported by Tom Van Goethem from imec-DistriNet, KU Leuven
    - CVE-2021-21174: Inappropriate implementation in Referrer. Reported by
      Ashish Gautam Kamble
    - CVE-2021-21175: Inappropriate implementation in Site isolation. Reported
      by Jun Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2021-21176: Inappropriate implementation in full screen mode.
      Reported by Luan Herrera @lbherrera_
    - CVE-2021-21177: Insufficient policy enforcement in Autofill. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2021-21178: Inappropriate implementation in Compositing. Reported by
      Japong
    - CVE-2021-21179: Use after free in Network Internals. Reported by
      Anonymous
    - CVE-2021-21180: Use after free in tab search. Reported by Abdulrahman
      Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2020-27844: Heap buffer overflow in OpenJPEG. Reported by Sean
      Campbell at Tableau
    - CVE-2021-21181: Side-channel information leakage in autofill. Reported by
      Xu Lin (University of Illinois at Chicago), Panagiotis Ilia University of
      Illinois at Chicago, Jason Polakis University of Illinois at Chicago
    - CVE-2021-21182: Insufficient policy enforcement in navigations. Reported
      by Luan Herrera @lbherrera_
    - CVE-2021-21183: Inappropriate implementation in performance APIs.
      Reported by Takashi Yoneuchi @y0n3uchy
    - CVE-2021-21184: Inappropriate implementation in performance APIs.
      Reported by James Hartig
    - CVE-2021-21185: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2021-21186: Insufficient policy enforcement in QR scanning. Reported
      by dhirajkumarnifty
    - CVE-2021-21187: Insufficient data validation in URL formatting. Reported
      by Kirtikumar Anandrao Ramchandani
    - CVE-2021-21188: Use after free in Blink. Reported by Woojin Oh
      @pwn_expoit of STEALIEN
    - CVE-2021-21189: Insufficient policy enforcement in payments. Reported by
      Khalil Zhani
    - CVE-2021-21190: Uninitialized Use in PDFium. Reported by Zhou Aiting
      @zhouat1 of Qihoo 360 Vulcan Team

 -- Michel Le Bihan <email address hidden>  Mon, 08 Mar 2021 09:48:03 +0100
Superseded in sid-release
chromium (88.0.4324.182-1) unstable; urgency=medium

  * New upstream security release.
    - CVE-2021-21149: Stack overflow in Data Transfer. Reported by Ryoya
      Tsukasaki
    - CVE-2021-21150: Use after free in Downloads. Reported by Woojin Oh
    - CVE-2021-21151: Use after free in Payments. Reported by Khalil Zhani
    - CVE-2021-21152: Heap buffer overflow in Media. Reported by Anonymous
    - CVE-2021-21153: Stack overflow in GPU Process. Reported by Jan Ruge
    - CVE-2021-21154: Heap buffer overflow in Tab Strip . Reported by
      Abdulrahman Alqabandi
    - CVE-2021-21155: Heap buffer overflow in Tab Strip . Reported by Khalil
      Zhani
    - CVE-2021-21156: Heap buffer overflow in V8. Reported by Sergei Glazunov
    - CVE-2021-21157: Use after free in Web Sockets. Reported by Anonymous

 -- Michael Gilbert <email address hidden>  Thu, 18 Feb 2021 00:56:55 +0000
Superseded in sid-release
chromium (88.0.4324.150-1) unstable; urgency=medium

  * New upstream security release (closes: #982205).
    - CVE-2021-21148: Heap buffer overflow in V8. Reported by Mattias Buelens

 -- Michel Le Bihan <email address hidden>  Tue, 09 Feb 2021 13:02:34 +0100
Superseded in buster-release
chromium (87.0.4280.141-0.1~deb10u1) buster-security; urgency=high

  * Non-maintainer upload.
  * New upstream security release (closes: 979520).
    - CVE-2021-21106: Use after free in autofill. Reported by Weipeng Jiang
      @Krace from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-21107: Use after free in drag and drop. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21108: Use after free in media. Reported by Leecraso and Guang
      Gong of 360 Alpha Lab
    - CVE-2021-21109: Use after free in payments. Reported by Rong Jian and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21110: Use after free in safe browsing. Reported by Anonymous
    - CVE-2021-21111: Insufficient policy enforcement in WebUI. Reported by
      Alesandro Ortiz
    - CVE-2021-21112: Use after free in Blink. Reported by YoungJoo Lee
      @ashuu_lee of Raon Whitehat
    - CVE-2021-21113: Heap buffer overflow in Skia. Reported by tsubmunu
    - CVE-2020-16043: Insufficient data validation in networking. Reported by
      Samy Kamkar, Ben Seri at Armis, Gregory Vishnepolsky at Armis
    - CVE-2021-21114: Use after free in audio. Reported by Man Yue Mo of GitHub
      Security Lab
    - CVE-2020-15995: Out of bounds write in V8. Reported by Bohan Liu
      @P4nda20371774 of Tencent Security Xuanwu Lab
    - CVE-2021-21115: Use after free in safe browsing. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21116: Heap buffer overflow in audio. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
  * Use desktop gl implementation as default. (closes: 979135)

 -- Jan Luca Naumann <email address hidden>  Mon, 11 Jan 2021 17:04:13 +0100
Superseded in sid-release
chromium (88.0.4324.146-1) unstable; urgency=medium

  * New upstream stable release.
    - CVE-2021-21142: Use after free in Payments. Reported by Khalil Zhani
    - CVE-2021-21143: Heap buffer overflow in Extensions. Reported by Allen
      Parker & Alex Morgan of MU
    - CVE-2021-21144: Heap buffer overflow in Tab Groups. Reported by Leecraso
      and Guang Gong of 360 Alpha Lab
    - CVE-2021-21145: Use after free in Fonts. Reported by Anonymous
    - CVE-2021-21146: Use after free in Navigation. Reported by Alison Huffman
      and Choongwoo Han of Microsoft Browser Vulnerability Research
    - CVE-2021-21147: Inappropriate implementation in Skia. Reported by Roman
      Starkov

 -- Michel Le Bihan <email address hidden>  Wed, 03 Feb 2021 11:11:02 +0100
Superseded in sid-release
chromium (88.0.4324.96-2) unstable; urgency=medium

  * Add Michel Le Bihan to uploaders.
  * Add openjpeg include dirs to pdfium BUILD.gn (closes: #981270).

 -- Michel Le Bihan <email address hidden>  Fri, 29 Jan 2021 12:37:49 +0100
Superseded in sid-release
chromium (88.0.4324.96-1) unstable; urgency=medium

  * Organize patches.
  * Use system vpx again.
  * Support icu 6.3 and clang 7 in buster again.
  * Apply the non-maintainer uploads (closes: #972134).
    - Thanks to Michel Le Bihan, Jan Luca Naumann, and Peter Michael Green.

 -- Michael Gilbert <email address hidden>  Wed, 27 Jan 2021 01:40:59 +0000
Superseded in sid-release
chromium (88.0.4324.96-0.1) unstable; urgency=medium

  * Non-maintainer upload.
  * New upstream stable release (closes: 980564).
    - CVE-2021-21117: Insufficient policy enforcement in Cryptohome. Reported
      by Rory McNamara
    - CVE-2021-21118: Insufficient data validation in V8. Reported by Tyler
      Nighswander @tylerni7 of Theori
    - CVE-2021-21119: Use after free in Media. Reported by Anonymous
    - CVE-2021-21120: Use after free in WebSQL. Reported by Nan Wang
      @eternalsakura13 and Guang Gong of 360 Alpha Lab
    - CVE-2021-21121: Use after free in Omnibox. Reported by Leecraso and Guang
      Gong of 360 Alpha Lab
    - CVE-2021-21122: Use after free in Blink. Reported by Renata Hodovan
    - CVE-2021-21123: Insufficient data validation in File System API. Reported
      by Maciej Pulikowski
    - CVE-2021-21124: Potential user after free in Speech Recognizer. Reported
      by Chaoyang Ding(@V4kst1z) from Codesafe Team of Legendsec at Qi'anxin
      Group
    - CVE-2021-21125: Insufficient policy enforcement in File System API.
      Reported by Ron Masas
    - CVE-2020-16044: Use after free in WebRTC. Reported by Ned Williamson of
      Project Zero
    - CVE-2021-21126: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2021-21127: Insufficient policy enforcement in extensions. Reported
      by Jasminder Pal Singh, Web Services Point WSP, Kotkapura
    - CVE-2021-21128: Heap buffer overflow in Blink. Reported by Liang Dong
    - CVE-2021-21129: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski
    - CVE-2021-21130: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski
    - CVE-2021-21131: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski
    - CVE-2021-21132: Inappropriate implementation in DevTools. Reported by
      David Erceg
    - CVE-2021-21133: Insufficient policy enforcement in Downloads. Reported by
      wester0x01
    - CVE-2021-21134: Incorrect security UI in Page Info. Reported by
      wester0x01
    - CVE-2021-21135: Inappropriate implementation in Performance API. Reported
      by ndevtk
    - CVE-2021-21136: Insufficient policy enforcement in WebView. Reported by
      Shiv Sahni, Movnavinothan V and Imdad Mohammed
    - CVE-2021-21137: Inappropriate implementation in DevTools. Reported by
      bobblybear
    - CVE-2021-21138: Use after free in DevTools. Reported by Weipeng Jiang
      @Krace from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-21139: Inappropriate implementation in iframe sandbox. Reported
      by Jun Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2021-21140: Uninitialized Use in USB. Reported by David Manouchehri
    - CVE-2021-21141: Insufficient policy enforcement in File System API.
      Reported by Maciej Pulikowski

  [ Jan Luca Naumann ]
  * Add watch file.

  [ Mattia Rizzolo ]
  * Change get-orig-source to produce reproducible tarballs.

 -- Michel Le Bihan <email address hidden>  Wed, 20 Jan 2021 23:23:08 +0100
Superseded in sid-release
chromium (87.0.4280.141-0.1) unstable; urgency=medium

  * Non-maintainer upload.
  * New upstream security release (closes: 979520).
    - CVE-2021-21106: Use after free in autofill. Reported by Weipeng Jiang
      @Krace from Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2021-21107: Use after free in drag and drop. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21108: Use after free in media. Reported by Leecraso and Guang
      Gong of 360 Alpha Lab
    - CVE-2021-21109: Use after free in payments. Reported by Rong Jian and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21110: Use after free in safe browsing. Reported by Anonymous
    - CVE-2021-21111: Insufficient policy enforcement in WebUI. Reported by
      Alesandro Ortiz
    - CVE-2021-21112: Use after free in Blink. Reported by YoungJoo Lee
      @ashuu_lee of Raon Whitehat
    - CVE-2021-21113: Heap buffer overflow in Skia. Reported by tsubmunu
    - CVE-2020-16043: Insufficient data validation in networking. Reported by
      Samy Kamkar, Ben Seri at Armis, Gregory Vishnepolsky at Armis
    - CVE-2021-21114: Use after free in audio. Reported by Man Yue Mo of GitHub
      Security Lab
    - CVE-2020-15995: Out of bounds write in V8. Reported by Bohan Liu
      @P4nda20371774 of Tencent Security Xuanwu Lab
    - CVE-2021-21115: Use after free in safe browsing. Reported by Leecraso and
      Guang Gong of 360 Alpha Lab
    - CVE-2021-21116: Heap buffer overflow in audio. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research

  [ Jan Luca Naumann ]
  * Use desktop gl implementation as default. (closes: 979135)

 -- Michel Le Bihan <email address hidden>  Sat, 09 Jan 2021 11:24:58 +0100
Superseded in sid-release
chromium (87.0.4280.88-0.4) unstable; urgency=medium

  * Non-maintainer upload.

  [ Michel Le Bihan ]
  * Install ANGLE EGL and GLESv2 libs (closes: 977870).
  * Disable Widevine CDM component updater (closes: 960454).
  * Disable usage of google-chrome in driver (closes: 930543).

  [ Jan Luca Naumann ]
  * Remove python3-xcbgen from Build-Deps
  * Changes to allow building on buster
  * Add patch for explicit python2 usage in scripts

 -- Michel Le Bihan <email address hidden>  Tue, 29 Dec 2020 10:58:42 +0100
Superseded in sid-release
chromium (87.0.4280.88-0.3) unstable; urgency=medium

  * Non-maintainer upload.
  * Fix double-delete in content service worker (closes: 977901).

 -- Michel Le Bihan <email address hidden>  Wed, 23 Dec 2020 11:55:48 +0100
Superseded in sid-release
chromium (87.0.4280.88-0.2) unstable; urgency=medium

  * Non-maintainer upload.
  * Exclude debian dir from unversioned python conversion script

 -- Michel Le Bihan <michel@debian>  Sun, 20 Dec 2020 22:14:50 +0100
Superseded in sid-release
chromium (87.0.4280.88-0.1) unstable; urgency=medium

  * Non-maintainer upload.
  * New upstream stable release (closes: 973848).
    - CVE-2020-16037: Use after free in clipboard. Reported by Ryoya Tsukasaki
    - CVE-2020-16038: Use after free in media. Reported by Khalil Zhani
    - CVE-2020-16039: Use after free in extensions. Reported by Anonymous
    - CVE-2020-16040: Insufficient data validation in V8. Reported by Lucas
      Pinheiro, Microsoft Browser Vulnerability Research
    - CVE-2020-16041: Out of bounds read in networking. Reported by Sergei
      Glazunov and Mark Brand of Google Project Zero
    - CVE-2020-16042: Uninitialized Use in V8. Reported by André Bargull
    - CVE-2020-16018: Use after free in payments. Reported by Man Yue Mo of
      GitHub Security Lab
    - CVE-2020-16019: Inappropriate implementation in filesystem. Reported by
      Rory McNamara
    - CVE-2020-16020: Inappropriate implementation in cryptohome. Reported by
      Rory McNamara
    - CVE-2020-16021: Race in ImageBurner. Reported by Rory McNamara
    - CVE-2020-16022: Insufficient policy enforcement in networking. Reported
      by @SamyKamkar
    - CVE-2020-16015: Insufficient data validation in WASM. Reported by Rong
      Jian and Leecraso of 360 Alpha Lab
    - CVE-2020-16014: Use after free in PPAPI. Reported by Rong Jian and
      Leecraso of 360 Alpha Lab
    - CVE-2020-16023: Use after free in WebCodecs. Reported by Brendon Tiszka
      and David Manouchehri supporting the @eff
    - CVE-2020-16024: Heap buffer overflow in UI. Reported by Sergei Glazunov
      of Google Project Zero
    - CVE-2020-16025: Heap buffer overflow in clipboard. Reported by Sergei
      Glazunov of Google Project Zero
    - CVE-2020-16026: Use after free in WebRTC. Reported by Jong-Gwon Kim
    - CVE-2020-16027: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2020-16028: Heap buffer overflow in WebRTC. Reported by asnine
    - CVE-2020-16029: Inappropriate implementation in PDFium. Reported by
      Anonymous
    - CVE-2020-16030: Insufficient data validation in Blink. Reported by Michał
      Bentkowski of Securitum
    - CVE-2019-8075: Insufficient data validation in Flash. Reported by
      Nethanel Gelernter, Cyberpion
    - CVE-2020-16031: Incorrect security UI in tab preview. Reported by
      wester0x01
    - CVE-2020-16032: Incorrect security UI in sharing. Reported by wester0x01
    - CVE-2020-16033: Incorrect security UI in WebUSB. Reported by Khalil Zhani
    - CVE-2020-16034: Inappropriate implementation in WebRTC. Reported by
      Benjamin Petermaier
    - CVE-2020-16035: Insufficient data validation in cros-disks. Reported by
      Rory McNamara
    - CVE-2020-16012: Side-channel information leakage in graphics. Reported by
      Aleksejs Popovs
    - CVE-2020-16036: Inappropriate implementation in cookies. Reported by Jun
      Kokatsu @shhnjk
    - CVE-2020-16013: Inappropriate implementation in V8. Reported by Anonymous
    - CVE-2020-16017: Use after free in site isolation. Reported by Anonymous
    - CVE-2020-16016: Inappropriate implementation in base. Reported by Rong
      Jian and Leecraso of 360 Alpha Lab
    - CVE-2020-16004: Use after free in user interface. Reported by Leecraso
      and Guang Gong of 360 Alpha Lab working with 360 BugCloud
    - CVE-2020-16005: Insufficient policy enforcement in ANGLE. Reported by
      Jaehun Jeong @n3sk of Theori
    - CVE-2020-16006: Inappropriate implementation in V8. Reported by Bill
      Parks
    - CVE-2020-16007: Insufficient data validation in installer. Reported by
      Abdelhamid Naceri
    - CVE-2020-16008: Stack buffer overflow in WebRTC. Reported by Tolya
      Korniltsev
    - CVE-2020-16009: Inappropriate implementation in V8. Reported by Clement
      Lecigne of Google's Threat Analysis Group and Samuel Groß of Google
      Project Zero
    - CVE-2020-16011: Heap buffer overflow in UI on Windows. Reported by Sergei
      Glazunov of Google Project Zero
    - CVE-2020-16000: Inappropriate implementation in Blink. Reported by
      amaebi_jp
    - CVE-2020-16001: Use after free in media. Reported by Khalil Zhani
    - CVE-2020-16002: Use after free in PDFium. Reported by Weipeng Jiang from
      Codesafe Team of Legendsec at Qi'anxin Group
    - CVE-2020-15999: Heap buffer overflow in Freetype. Reported by Sergei
      Glazunov of Google Project Zero
    - CVE-2020-16003: Use after free in printing. Reported by Khalil Zhani
    - CVE-2020-15967: Use after free in payments. Reported by Man Yue Mo of
      GitHub Security Lab
    - CVE-2020-15968: Use after free in Blink. Reported by Anonymous
    - CVE-2020-15969: Use after free in WebRTC. Reported by Anonymous
    - CVE-2020-15970: Use after free in NFC. Reported by Man Yue Mo of GitHub
      Security Lab
    - CVE-2020-15971: Use after free in printing. Reported by Jun Kokatsu,
      Microsoft Browser Vulnerability Research
    - CVE-2020-15972: Use after free in audio. Reported by Anonymous
    - CVE-2020-15990: Use after free in autofill. Reported by Rong Jian and
      Guang Gong of Alpha Lab, Qihoo 360
    - CVE-2020-15991: Use after free in password manager. Reported by Rong Jian
      and Guang Gong of Alpha Lab, Qihoo 360
    - CVE-2020-15973: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2020-15974: Integer overflow in Blink. Reported by Juno Im of Theori
    - CVE-2020-15975: Integer overflow in SwiftShader. Reported by Anonymous
    - CVE-2020-15976: Use after free in WebXR. Reported by YoungJoo Lee
      @ashuu_lee of Raon Whitehat
    - CVE-2020-6557: Inappropriate implementation in networking. Reported by
      Matthias Gierlings and Marcus Brinkmann
    - CVE-2020-15977: Insufficient data validation in dialogs. Reported by
      Narendra Bhati
    - CVE-2020-15978: Insufficient data validation in navigation. Reported by
      Luan Herrera @lbherrera_
    - CVE-2020-15979: Inappropriate implementation in V8. Reported by Avihay
      Cohen @ SeraphicAlgorithms
    - CVE-2020-15980: Insufficient policy enforcement in Intents. Reported by
      Yongke Wang @Rudykewang and Aryb1n @aryb1n of Tencent Security Xuanwu Lab
    - CVE-2020-15981: Out of bounds read in audio. Reported by Christoph
      Guttandin
    - CVE-2020-15982: Side-channel information leakage in cache. Reported by
      Luan Herrera @lbherrera_
    - CVE-2020-15983: Insufficient data validation in webUI. Reported by Jun
      Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2020-15984: Insufficient policy enforcement in Omnibox. Reported by
      Rayyan Bijoora
    - CVE-2020-15985: Inappropriate implementation in Blink. Reported by
      Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
    - CVE-2020-15986: Integer overflow in media. Reported by Mark Brand of
      Google Project Zero
    - CVE-2020-15987: Use after free in WebRTC. Reported by Philipp Hancke
    - CVE-2020-15992: Insufficient policy enforcement in networking. Reported
      by Alison Huffman, Microsoft Browser Vulnerability Research
    - CVE-2020-15988: Insufficient policy enforcement in downloads. Reported by
      Samuel Attard
    - CVE-2020-15989: Uninitialized Use in PDFium. Reported by Gareth Evans
    - CVE-2020-15960: Out of bounds read in storage. Reported by Anonymous
    - CVE-2020-15961: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2020-15962: Insufficient policy enforcement in serial. Reported by
      Leecraso and Guang Gong of 360 Alpha Lab working with 360 BugCloud
    - CVE-2020-15963: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2020-15965: Out of bounds write in V8. Reported by Lucas Pinheiro,
      Microsoft Browser Vulnerability Research
    - CVE-2020-15966: Insufficient policy enforcement in extensions. Reported
      by David Erceg
    - CVE-2020-15964: Insufficient data validation in media. Reported by Woojin
      Oh @pwn_expoit of STEALIEN
    - CVE-2020-6573: Use after free in video. Reported by Leecraso and Guang
      Gong of 360 Alpha Lab working with 360 BugCloud
    - CVE-2020-6574: Insufficient policy enforcement in installer. Reported by
      CodeColorist of Ant-Financial LightYear Labs
    - CVE-2020-6575: Race in Mojo. Reported by Microsoft
    - CVE-2020-6576: Use after free in offscreen canvas. Reported by Looben
      Yang
    - CVE-2020-15959: Insufficient policy enforcement in networking. Reported
      by Eric Lawrence of Microsoft
    - CVE-2020-6558: Insufficient policy enforcement in iOS. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
    - CVE-2020-6559: Use after free in presentation API. Reported by Liu Wei
      and Wu Zekai of Tencent Security Xuanwu Lab
    - CVE-2020-6560: Insufficient policy enforcement in autofill. Reported by
      Nadja Ungethuem from www.unnex.de
    - CVE-2020-6561: Inappropriate implementation in Content Security Policy.
      Reported by Rob Wu
    - CVE-2020-6562: Insufficient policy enforcement in Blink. Reported by
      Masato Kinugawa
    - CVE-2020-6563: Insufficient policy enforcement in intent handling.
      Reported by Pedro Oliveira
    - CVE-2020-6564: Incorrect security UI in permissions. Reported by Khalil
      Zhani
    - CVE-2020-6565: Incorrect security UI in Omnibox. Reported by Khalil Zhani
    - CVE-2020-6566: Insufficient policy enforcement in media. Reported by Jun
      Kokatsu, Microsoft Browser Vulnerability Research
    - CVE-2020-6567: Insufficient validation of untrusted input in command line
      handling. Reported by Joshua Graham of TSS
    - CVE-2020-6568: Insufficient policy enforcement in intent handling.
      Reported by Yongke Wang @Rudykewang and Aryb1n @aryb1n of Tencent
      Security Xuanwu Lab
    - CVE-2020-6569: Integer overflow in WebUSB. Reported by guaixiaomei
    - CVE-2020-6570: Side-channel information leakage in WebRTC. Reported by
      Signal/Tenable
    - CVE-2020-6571: Incorrect security UI in Omnibox. Reported by Rayyan
      Bijoora
    - CVE-2020-6556: Heap buffer overflow in SwiftShader. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
    - CVE-2020-6542: Use after free in ANGLE. Reported by Piotr Bania of Cisco
      Talos
    - CVE-2020-6543: Use after free in task scheduling. Reported by Looben Yang
    - CVE-2020-6544: Use after free in media. Reported by Tim Becker of Theori
    - CVE-2020-6545: Use after free in audio. Reported by Anonymous
    - CVE-2020-6546: Inappropriate implementation in installer. Reported by
      Andrew Hess
    - CVE-2020-6547: Incorrect security UI in media. Reported by David Albert
    - CVE-2020-6548: Heap buffer overflow in Skia. Reported by Choongwoo Han,
      Microsoft Browser Vulnerability Research
    - CVE-2020-6549: Use after free in media. Reported by Sergei Glazunov of
      Google Project Zero
    - CVE-2020-6550: Use after free in IndexedDB. Reported by Sergei Glazunov
      of Google Project Zero
    - CVE-2020-6551: Use after free in WebXR. Reported by Sergei Glazunov of
      Google Project Zero
    - CVE-2020-6552: Use after free in Blink. Reported by Tim Becker of Theori
    - CVE-2020-6553: Use after free in offline mode. Reported by Alison
      Huffman, Microsoft Browser Vulnerability Research
    - CVE-2020-6554: Use after free in extensions. Reported by Anonymous
    - CVE-2020-6555: Out of bounds read in WebGL. Reported by Marcin Towalski
      of Cisco Talos

 -- Michel Le Bihan <email address hidden>  Tue, 01 Dec 2020 00:00:00 +0000
Superseded in sid-release
chromium (83.0.4103.116-3.1) unstable; urgency=medium

  * Non-maintainer upload.
  * Add 64-bit time syscalls to syscall whitelist and clock selection
    parameter filtering code
  * Switch to explicitly versioned python2
    + Update build-depends
    + Replace references to /usr/bin/python and to env python
      with /usr/bin/python2 and env python2
    + make exec_script in gn use python2
    + add code in debian/rules clean to set the shebang in
      third_party/closure_compiler/compiler.py it seems someting in the upstream
      build system sometimes resets it.

 -- Peter Michael Green <email address hidden>  Tue, 15 Sep 2020 13:10:35 +0000
Deleted in experimental-release (Reason: None provided.)
chromium (84.0.4147.105-1) experimental; urgency=medium

  * New upstream security release.
    - CVE-2020-6537: Type Confusion in V8. Reported by Rong Jian and Guang Gong
    - CVE-2020-6532: Use after free in SCTP. Reported by Anonymous
    - CVE-2020-6538: Inappropriate implementation in WebView. Reported by
      Yongke Wang and Aryb1n
    - CVE-2020-6539: Use after free in CSS. Reported by Oriol Brufau
    - CVE-2020-6540: Heap buffer overflow in Skia. Reported by Zhen Zhou
    - CVE-2020-6541: Use after free in WebUSB. Reported by Sergei Glazunov

 -- Michael Gilbert <email address hidden>  Sat, 01 Aug 2020 03:00:31 +0000
Superseded in buster-release
chromium (83.0.4103.116-1~deb10u3) buster-security; urgency=medium

  * Fix crashes when a connection error occurs (closes: #963548).

 -- Michael Gilbert <email address hidden>  Sun, 12 Jul 2020 07:08:46 -0400
Superseded in experimental-release
chromium (84.0.4147.89-1) experimental; urgency=medium

  * New upstream stable release.
    - CVE-2020-6510: Heap buffer overflow in background fetch. Reported by
      Leecraso and Guang Gong
    - CVE-2020-6511: Side-channel information leakage in content security
      policy. Reported by Mikhail Oblozhikhin
    - CVE-2020-6512: Type Confusion in V8. Reported by nocma, leogan, cheneyxu
    - CVE-2020-6513: Heap buffer overflow in PDFium. Reported by Aleksandar
      Nikolic
    - CVE-2020-6514: Inappropriate implementation in WebRTC. Reported by
      Natalie Silvanovich
    - CVE-2020-6515: Use after free in tab strip. Reported by DDV_UA
    - CVE-2020-6516: Policy bypass in CORS. Reported by Yongke Wang and Aryb1n
    - CVE-2020-6517: Heap buffer overflow in history. Reported by ZeKai Wu
    - CVE-2020-6518: Use after free in developer tools. Reported by David Erceg
    - CVE-2020-6519: Policy bypass in CSP. Reported by Gal Weizman
    - CVE-2020-6520: Heap buffer overflow in Skia. Reported by Zhen Zhou
    - CVE-2020-6521: Side-channel information leakage in autofill. Reported by
      Xu Lin, Panagiotis Ilia, Jason Polakis
    - CVE-2020-6522: Inappropriate implementation in external protocol
      handlers. Reported by Eric Lawrence
    - CVE-2020-6523: Out of bounds write in Skia. Reported by Liu Wei and Wu
      Zekai
    - CVE-2020-6524: Heap buffer overflow in WebAudio. Reported by Sung Ta
    - CVE-2020-6525: Heap buffer overflow in Skia. Reported by Zhen Zhou
    - CVE-2020-6526: Inappropriate implementation in iframe sandbox. Reported
      by Jonathan Kingston
    - CVE-2020-6527: Insufficient policy enforcement in CSP. Reported by Zhong
      Zhaochen
    - CVE-2020-6528: Incorrect security UI in basic auth. Reported by Rayyan
      Bijoora
    - CVE-2020-6529: Inappropriate implementation in WebRTC. Reported by
      kaustubhvats7
    - CVE-2020-6530: Out of bounds memory access in developer tools. Reported
      by myvyang
    - CVE-2020-6531: Side-channel information leakage in scroll to text.
      Reported by Jun Kokatsu
    - CVE-2020-6533: Type Confusion in V8. Reported by Avihay Cohen
    - CVE-2020-6534: Heap buffer overflow in WebRTC. Reported by Anonymous
    - CVE-2020-6535: Insufficient data validation in WebUI. Reported by Jun
      Kokatsu
    - CVE-2020-6536: Incorrect security UI in PWAs. Reported by Zhiyang Zeng
  * Update information in debian/copyright.
  * Include more upstream metadata information.

 -- Michael Gilbert <email address hidden>  Sun, 26 Jul 2020 15:21:41 +0000
Published in stretch-release
chromium (73.0.3683.75-1~deb9u1) stretch-security; urgency=medium

  * New upstream stable release.
    - CVE-2019-5787: Use after free in Canvas. Reported by Zhe Jin
    - CVE-2019-5788: Use after free in FileAPI. Reported by Mark Brand
    - CVE-2019-5789: Use after free in WebMIDI. Reported by Mark Brand
    - CVE-2019-5790: Heap buffer overflow in V8. Reported by Dimitri Fourny
    - CVE-2019-5791: Type confusion in V8. Reported by Choongwoo Han
    - CVE-2019-5792: Integer overflow in PDFium. Reported by pdknsk
    - CVE-2019-5793: Excessive permissions for private API in Extensions.
      Reported by Jun Kokatsu
    - CVE-2019-5794: Security UI spoofing. Reported by Juno Im of Theori
    - CVE-2019-5795: Integer overflow in PDFium. Reported by pdknsk
    - CVE-2019-5796: Race condition in Extensions. Reported by Mark Brand
    - CVE-2019-5797: Race condition in DOMStorage. Reported by Mark Brand
    - CVE-2019-5798: Out of bounds read in Skia. Reported by Tran Tien Hung
    - CVE-2019-5799: CSP bypass with blob URL. Reported by sohalt
    - CVE-2019-5800: CSP bypass with blob URL. Reported by Jun Kokatsu
    - CVE-2019-5802: Security UI spoofing. Reported by Ronni Skansing
    - CVE-2019-5803: CSP bypass with Javascript URLs'. Reported by Andrew
      Comminos

 -- Michael Gilbert <email address hidden>  Tue, 26 Mar 2019 23:43:33 +0000
Superseded in sid-release
chromium (83.0.4103.116-3) unstable; urgency=high

  * Fix crashes when a connection error occurs (closes: #963548).
    - Thank you so much to Riku Voipio.

 -- Michael Gilbert <email address hidden>  Sat, 11 Jul 2020 14:56:34 +0000
Superseded in sid-release
chromium (83.0.4103.116-2) unstable; urgency=medium

  * Fix crashes due to ffmpeg 4.3 (closes: #963035).

 -- Michael Gilbert <email address hidden>  Mon, 29 Jun 2020 10:28:15 +0000
Superseded in sid-release
chromium (83.0.4103.116-1) unstable; urgency=medium

  * New upstream security release.
    - CVE-2020-6509: Use after free in extensions. Reported by Anonymous

 -- Michael Gilbert <email address hidden>  Mon, 22 Jun 2020 19:45:51 +0000
Superseded in sid-release
chromium (83.0.4103.106-1) unstable; urgency=medium

  * New upstream security release.
    - CVE-2020-6493: Use after free in WebAuthentication. Reported by Anonymous
    - CVE-2020-6494: Incorrect security UI in payments. Reported by Juho
      Nurminen
    - CVE-2020-6495: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2020-6496: Use after free in payments. Reported by Khalil Zhani
    - CVE-2020-6497: Insufficient policy enforcement in Omnibox. Reported by
      Rayyan Bijoora
    - CVE-2020-6498: Incorrect security UI in progress display. Reported by
      Rayyan Bijoora
    - CVE-2020-6505: Use after free in speech. Reported by Khalil Zhani
    - CVE-2020-6506: Insufficient policy enforcement in WebView. Reported by
      Alesandro Ortiz
    - CVE-2020-6507: Out of bounds write in V8. Reported by Sergei Glazunov
  * Conflict with ffmpeg 4.3 (closes: #963080).
  * Support building with icu 67 (closes: #960236).
  * Support building with re2 20200501 (closes: #960361).

 -- Michael Gilbert <email address hidden>  Fri, 19 Jun 2020 00:40:28 +0000
Superseded in sid-release
chromium (83.0.4103.83-1) unstable; urgency=medium

  * New upstream stable release.
    - CVE-2020-6457: Use after free in speech recognizer. Reported by Leecraso
      and Guang Gong
    - CVE-2020-6458: Out of bounds read and write in PDFium. Reported by
      Aleksandar Nikolic
    - CVE-2020-6459: Use after free in payments. Reported by Zhe Jin
    - CVE-2020-6460: Insufficient data validation in URL formatting. Reported
      by Anonymous
    - CVE-2020-6461: Use after free in storage. Reported by Zhe Jin
    - CVE-2020-6462: Use after free in task scheduling. Reported by Zhe Jin
    - CVE-2020-6463: Use after free in ANGLE. Reported by Pawel Wylecial
    - CVE-2020-6464: Type Confusion in Blink. Reported by Looben Yang
    - CVE-2020-6465: Use after free in reader mode. Reported by Woojin Oh
    - CVE-2020-6466: Use after free in media. Reported by Zhe Jin
    - CVE-2020-6467: Use after free in WebRTC. Reported by ZhanJia Song
    - CVE-2020-6468: Type Confusion in V8. Reported by Chris Salls and Jake
      Corina
    - CVE-2020-6469: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2020-6470: Insufficient validation of untrusted input in clipboard.
      Reported by Michał Bentkowski
    - CVE-2020-6471: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2020-6472: Insufficient policy enforcement in developer tools.
      Reported by David Erceg
    - CVE-2020-6473: Insufficient policy enforcement in Blink. Reported by
      Soroush Karami and Panagiotis Ilia
    - CVE-2020-6474: Use after free in Blink. Reported by Zhe Jin
    - CVE-2020-6475: Incorrect security UI in full screen. Reported by Khalil
      Zhani
    - CVE-2020-6476: Insufficient policy enforcement in tab strip. Reported by
      Alexandre Le Borgne
    - CVE-2020-6478: Inappropriate implementation in full screen. Reported by
      Khalil Zhani
    - CVE-2020-6479: Inappropriate implementation in sharing. Reported by Zhong
      Zhaochen
    - CVE-2020-6480: Insufficient policy enforcement in enterprise. Reported by
      Marvin Witt
    - CVE-2020-6481: Insufficient policy enforcement in URL formatting.
      Reported by Rayyan Bijoora
    - CVE-2020-6482: Insufficient policy enforcement in developer tools.
      Reported by Abdulrahman Alqabandi
    - CVE-2020-6483: Insufficient policy enforcement in payments. Reported by
      Jun Kokatsu
    - CVE-2020-6484: Insufficient data validation in ChromeDriver. Reported by
      Artem Zinenko
    - CVE-2020-6485: Insufficient data validation in media router. Reported by
      Sergei Glazunov
    - CVE-2020-6486: Insufficient policy enforcement in navigations. Reported
      by David Erceg
    - CVE-2020-6487: Insufficient policy enforcement in downloads. Reported by
      Jun Kokatsu
    - CVE-2020-6488: Insufficient policy enforcement in downloads. Reported by
      David Erceg
    - CVE-2020-6489: Inappropriate implementation in developer tools. Reported
      by @lovasoa
    - CVE-2020-6490: Insufficient data validation in loader. Reported by
      Twitter
    - CVE-2020-6491: Incorrect security UI in site information. Reported by
      Sultan Haikal
    - CVE-2020-6831: Stack buffer overflow in SCTP. Reported by Natalie
      Silvanovich

 -- Michael Gilbert <email address hidden>  Thu, 18 Jun 2020 02:05:11 +0000
Superseded in buster-release
chromium (80.0.3987.162-1~deb10u1) buster-security; urgency=medium

  * New upstream security release.
    - CVE-2020-6450: Use after free in WebAudio. Reported by Man Yue Mo
    - CVE-2020-6451: Use after free in WebAudio. Reported by Man Yue Mo
    - CVE-2020-6452: Heap buffer overflow in media. Reported by asnine

 -- Michael Gilbert <email address hidden>  Thu, 02 Apr 2020 22:23:57 +0000
Superseded in sid-release
chromium (81.0.4044.92-1) unstable; urgency=medium

  * New upstream stable release.
    - CVE-2020-6423: Use after free in audio. Reported by Anonymous
    - CVE-2020-6430: Type Confusion in V8. Reported by Avihay Cohen
    - CVE-2020-6431: Insufficient policy enforcement in full screen. Reported
      by Luan Herrera
    - CVE-2020-6432: Insufficient policy enforcement in navigations. Reported
      by David Erceg
    - CVE-2020-6433: Insufficient policy enforcement in extensions. Reported by
      David Erceg
    - CVE-2020-6434: Use after free in devtools. Reported by HyungSeok Han
    - CVE-2020-6435: Insufficient policy enforcement in extensions. Reported by
      Sergei Glazunov
    - CVE-2020-6436: Use after free in window management. Reported by Igor
      Bukanov
    - CVE-2020-6437: Inappropriate implementation in WebView. Reported by Jann
      Horn
    - CVE-2020-6438: Insufficient policy enforcement in extensions. Reported by
      Ng Yik Phang
    - CVE-2020-6439: Insufficient policy enforcement in navigations. Reported
      by remkoboonstra
    - CVE-2020-6440: Inappropriate implementation in extensions. Reported by
      David Erceg
    - CVE-2020-6441: Insufficient policy enforcement in omnibox. Reported by
      David Erceg
    - CVE-2020-6442: Inappropriate implementation in cache. Reported by B@rMey
    - CVE-2020-6443: Insufficient data validation in developer tools. Reported
      by @lovasoa
    - CVE-2020-6444: Uninitialized use in WebRTC. Reported by mlfbrown
    - CVE-2020-6445: Insufficient policy enforcement in trusted types. Reported
      by Jun Kokatsu
    - CVE-2020-6446: Insufficient policy enforcement in trusted types. Reported
      by Jun Kokatsu
    - CVE-2020-6447: Inappropriate implementation in developer tools. Reported
      by David Erceg
    - CVE-2020-6448: Use after free in V8. Reported by Guang Gong
    - CVE-2020-6454: Use after free in extensions. Reported by leecraso and
      Guang Gong
    - CVE-2020-6455: Out of bounds read in WebSQL. Reported by Nan Wang and
      Guang Gong
    - CVE-2020-6456: Insufficient validation of untrusted input in clipboard.
      Reported by Michał Bentkowski

 -- Michael Gilbert <email address hidden>  Tue, 07 Apr 2020 23:05:20 +0000
76150 of 195 results