• Accepted chromium 112.0.5615.49-2~deb11u1 (source) into proposed-update

    From Debian FTP Masters@21:1/5 to All on Sun Apr 16 12:50:02 2023
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA256

    Format: 1.8
    Date: Fri, 07 Apr 2023 13:58:37 -0400
    Source: chromium
    Architecture: source
    Version: 112.0.5615.49-2~deb11u1
    Distribution: bullseye-security
    Urgency: high
    Maintainer: Debian Chromium Team <chromium@packages.debian.org>
    Changed-By: Andres Salomon <dilinger@debian.org>
    Changes:
    chromium (112.0.5615.49-2~deb11u1) bullseye-security; urgency=high
    .
    [ Andres Salomon ]
    * Add d/patches/i386/angle-lockfree.patch to fix FTBFS on i386. Also create
    & populate that d/patches/i386/ directory, since we now have multiple
    i386 patches.
    * Remove enable_js_type_check=false build arg; upstream dropped it.
    * d/patches/bullseye:
    - downgrade-rollup.patch: downgrade the bundled rollup back to 2.58,
    as rollup 3.x requires nodejs >= 14.
    - default-equality-op.patch: work around an issue with clang-13 and
    setting the default equality operator.
    - ptr-traits-bug.patch: provide our own copy of <bits/ptr_traits.h>
    to work around a bug in libstdc++ 10.2. This bug is fixed in sid's
    libstdc++.
    .
    [ Timothy Pearson ]
    * d/patches:
    - Re-add boringssl support for ppc64le (dropped by Google upstream)
    - Add ppc64le detection to partition allocator build
    - Regenerate 0003-third_party-ffmpeg-Add-ppc64-generated-config.patch
    .
    chromium (112.0.5615.49-1) unstable; urgency=high
    .
    * New upstream stable release.
    - CVE-2023-1810: Heap buffer overflow in Visuals.
    Reported by Weipeng Jiang (@Krace) of VRI.
    - CVE-2023-1811: Use after free in Frames. Reported by Thomas Orlita.
    - CVE-2023-1812: Out of bounds memory access in DOM Bindings.
    Reported by Shijiang Yu.
    - CVE-2023-1813: Inappropriate implementation in Extensions.
    Reported by Axel Chong.
    - CVE-2023-1814: Insufficient validation of untrusted input in
    Safe Browsing. Reported by Young Min Kim (@ylemkimon),
    CompSec Lab at Seoul National University.
    - CVE-2023-1815: Use after free in Networking APIs. Reported by DDV_UA.
    - CVE-2023-1816: Incorrect security UI in Picture In Picture.
    Reported by NDevTK.
    - CVE-2023-1817: Insufficient policy enforcement in Intents.
    Reported by Axel Chong.
    - CVE-2023-1818: Use after free in Vulkan. Reported by Abdulrahman
    Alqabandi, Microsoft Browser Vulnerability Research, Eric Lawrence,
    Microsoft, Patrick Walker (@HomeSen), & Kirtikumar Anandrao Ramchandani.
    - CVE-2023-1819: Out of bounds read in Accessibility.
    Reported by Microsoft Edge Team.
    - CVE-2023-1820: Heap buffer overflow in Browser History.
    Reported by raven at KunLun lab.
    - CVE-2023-1821: Inappropriate implementation in WebShare.
    Reported by Axel Chong.
    - CVE-2023-1822: Incorrect security UI in Navigation. Reported by 강우진.
    - CVE-2023-1823: Inappropriate implementation in FedCM.
    Reported by Jasper Rebane (popstonia).
    * d/copyright: change location for deleted image_diff directory.
    * d/patches:
    - disable/unrar.patch: update for stuff dropped upstream.
    - disable/swiftshader.patch: straight refresh.
    - bullseye/clang13.patch: straight refresh.
    - ppc64le/third_party/0001-third_party-angle-Include-missing-header-cstddef-in-.patch:
    straight refresh.
    - ppc64le/third_party/use-sysconf-page-size-on-ppc64.patch: straight
    refresh.
    - debian/patches/ppc64le/third_party/0003-third_party-ffmpeg-Add-ppc64-generated-config.patch:
    change is_mac to is_apple.
    Checksums-Sha1:
    6472883ea22124b84008f593af1526dc140dc560 3801 chromium_112.0.5615.49-2~deb11u1.dsc
    a04a362826316ceddfdb80871ff805928e099e41 661675416 chromium_112.0.5615.49.orig.tar.xz
    52789e9d42cffd1b66a2fabc6db2ea2e37d77f8b 628424 chromium_112.0.5615.49-2~deb11u1.debian.tar.xz
    e84be325978edff6f10a0de16d8242aef8a9a473 21590 chromium_112.0.5615.49-2~deb11u1_source.buildinfo
    Checksums-Sha256:
    0e885b08c598909c88bb5565f2770c343b326e88dcbdffe6c1b469e477bd8ced 3801 chromium_112.0.5615.49-2~deb11u1.dsc
    a70a4c72d5ba72ede51999d075e07b696dbba93f8e4790fe21b3c7abdddbebc3 661675416 chromium_112.0.5615.49.orig.tar.xz
    8cb57cfa37cd8255e95dabb06aabccfb11d7a778debee332ad63cc1a52cdc354 628424 chromium_112.0.5615.49-2~deb11u1.debian.tar.xz
    d357dc8cb97b42b758a4b055d5df49408a37878bf3715750eed4d35c22843a3f 21590 chromium_112.0.5615.49-2~deb11u1_source.buildinfo
    Files:
    0a47f942bde5e7c0f039855273d1e38f 3801 web optional chromium_112.0.5615.49-2~deb11u1.dsc
    6889caf6a47d1a38c07eb4a054e6e49d 661675416 web optional chromium_112.0.5615.49.orig.tar.xz
    48a83c587bc485029cd1f070b2b2a41a 628424 web optional chromium_112.0.5615.49-2~deb11u1.debian.tar.xz
    44bdacd8ae822286624b4aa7302829f2 21590 web optional chromium_112.0.5615.49-2~deb11u1_source.buildinfo

    -----BEGIN PGP SIGNATURE-----

    iQJIBAEBCAAyFiEEUAUk+X1YiTIjs19qZF0CR8NudjcFAmQwmk8UHGRpbGluZ2Vy QGRlYmlhbi5vcmcACgkQZF0CR8NudjfT0w/+JVQCfDm6vZKwUna2dArBVMUQWU+v sD4MsJ5z7g+VkXMrwSi6jcls4kfJN82bZdyVIsXoCl72HkkcUZbzCVBiAUJWGJD1 ifBvFPzb1ftlSOByNNqspVS6hAHzjnMunGuhPtLaosRNSwyBnnToA5lPYHIVshpY QI2v3LImQyxIlR6U2caC+VyAQR1SiYJZsFDy3rplkPhDXqkg3nXLEqPcQpbIgxsI BC9D2hHDZ3EDlc0WVf1fSRDj3WV4Y0CU5oYftBUYKCEqScbWQN7QYrvyqMjYYEK/ uyIvA5Zx4Gb/Hf28jAwXCeYXdacH+ItnHGujS/CQGf+gqrJ2Et02WWhXAhT7CZmq fckhMm1qfgX5XmayTacRG3FIUbXMxp1ZAsgVD2UWbJ/EPXokv8EJzC8EdqgT39Qi oN+tIYtx7N6Jw5+BwPtSJf6hq5GulVX/yRn0vEccdc3EhSr8oEVzgDzW8qBhsXAE 0qZBAZjcnMm7d5VsYM5uFepnf5jBDvprunutSgPyJcGsH4bglyA94+hPTM2HGGmF DnLoBAK+2wJxVxhQU3Lc88lvJ9lAFPI+04gLXW109nJZfU67wqLY4ex4QBzFL27k evT6F0rcFgkJYiR9qJXIQxi3KoCO07siyGh/pVmx/8Ewpp+khkgGRhMobzwPfIe+ BSw9+v8eoUCM9lE=
    =uq5d
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)