Your message dated Sat, 22 Jan 2022 19:17:17 +0000
with message-id <e1nblsz-0005zy...@fasolo.debian.org>
and subject line Bug#995212: fixed in chromium 97.0.4692.71-0.1~deb11u1
has caused the Debian Bug report #995212,
regarding chromium: Update to version 94.0.4606.61 (security-fixes)
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
995212: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=995212
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: chromium
Version: 93.0.4577.82-1
Severity: normal
X-Debbugs-Cc: sedat.di...@gmail.com
Dear Maintainer,
I updated my google-chrome-stable package to version 94.0.4606.61-1 on my
Debian/unstable AMD64 system.
Debian's security-tracker for chromium [1] package shows several CVE security
issues not fixed.
Open issues:
Bug stretch buster bullseye bookworm
sid Description
CVE-2021-37973 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37972 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37971 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37970 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37969 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37968 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37967 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37966 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37965 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37964 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37963 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37962 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37961 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37960 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37959 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37958 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37957 vulnerable vulnerable vulnerable vulnerable
vulnerable
CVE-2021-37956 vulnerable vulnerable vulnerable vulnerable
vulnerable
For more details also see "Stable Channel Update for Desktop" at [2].
Please upgrade chromium from v93.x to v94.x.
Thanks.
Regards,
- Sedat -
[1] https://security-tracker.debian.org/tracker/source-package/chromium
[2] https://chromereleases.googleblog.com/search/label/Stable%20updates
[3]
https://www.heise.de/news/Google-schliesst-19-Sicherheitsluecken-in-Chrome-6199412.html
(German)
-- System Information:
Debian Release: bookworm/sid
APT prefers stable-security
APT policy: (500, 'stable-security'), (500, 'testing'), (500, 'stable'), (99,
'buildd-unstable'), (99, 'buildd-experimental'), (99, 'experimental'), (99,
'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 5.14.0-1-amd64 (SMP w/4 CPU threads)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages chromium depends on:
ii chromium-common 93.0.4577.82-1
ii libasound2 1.2.5.1-1
ii libatk-bridge2.0-0 2.38.0-2
ii libatk1.0-0 2.36.0-2
ii libatomic1 11.2.0-8
ii libatspi2.0-0 2.42.0-1
ii libavcodec58 7:4.4-6+b2
ii libavformat58 7:4.4-6+b2
ii libavutil56 7:4.4-6+b2
ii libc6 2.32-4
ii libcairo2 1.16.0-5
ii libcups2 2.3.3op2-7
ii libdbus-1-3 1.12.20-2
ii libdrm2 2.4.107-8
ii libevent-2.1-7 2.1.12-stable-1
ii libexpat1 2.4.1-2+b1
ii libflac8 1.3.3-2
ii libfontconfig1 2.13.1-4.2
ii libfreetype6 2.10.4+dfsg-1
ii libgbm1 21.2.2-1
ii libgcc-s1 11.2.0-8
ii libglib2.0-0 2.70.0-1+b1
ii libharfbuzz0b 2.7.4-1
ii libicu67 67.1-7
ii libjpeg62-turbo 1:2.0.6-4
ii libjsoncpp24 1.9.4-4
ii liblcms2-2 2.12~rc1-2
ii libminizip1 1.1-8+b1
ii libnspr4 2:4.32-1
ii libnss3 2:3.70-1
ii libopenjp2-7 2.4.0-3
ii libopus0 1.3.1-0.1
ii libpango-1.0-0 1.48.10+ds1-1
ii libpng16-16 1.6.37-3
ii libpulse0 15.0+dfsg1-2
ii libre2-9 20210901+dfsg-1
ii libsnappy1v5 1.1.8-1
ii libstdc++6 11.2.0-8
ii libwebp6 0.6.1-2.1
ii libwebpdemux2 0.6.1-2.1
ii libwebpmux3 0.6.1-2.1
ii libx11-6 2:1.7.2-2+b1
ii libxcb1 1.14-3
ii libxcomposite1 1:0.4.5-1
ii libxdamage1 1:1.1.5-2
ii libxext6 2:1.3.4-1
ii libxfixes3 1:5.0.3-2
ii libxml2 2.9.12+dfsg-5
ii libxrandr2 2:1.5.1-1
ii libxshmfence1 1.3-1
ii libxslt1.1 1.1.34-4
ii zlib1g 1:1.2.11.dfsg-2
Versions of packages chromium recommends:
ii chromium-sandbox 93.0.4577.82-1
Versions of packages chromium suggests:
pn chromium-driver <none>
ii chromium-l10n 93.0.4577.82-1
pn chromium-shell <none>
Versions of packages chromium-common depends on:
ii libc6 2.32-4
ii libstdc++6 11.2.0-8
ii libx11-6 2:1.7.2-2+b1
ii libxext6 2:1.3.4-1
ii x11-utils 7.7+5
ii xdg-utils 1.1.3-4.1
ii zlib1g 1:1.2.11.dfsg-2
Versions of packages chromium-common recommends:
ii chromium-sandbox 93.0.4577.82-1
ii fonts-liberation 1:1.07.4-11
ii gnome-shell [notification-daemon] 40.5-1
ii libgl1-mesa-dri 21.2.2-1
ii libu2f-udev 1.1.10-3
ii notification-daemon 3.20.0-4+b1
ii plasma-workspace [notification-daemon] 4:5.22.90-1~np2
ii system-config-printer 1.5.14-1
ii upower 0.99.13-1
Versions of packages chromium-sandbox depends on:
ii libc6 2.32-4
-- Configuration Files:
/etc/chromium.d/default-flags changed [not included]
-- no debconf information
--- End Message ---
--- Begin Message ---
Source: chromium
Source-Version: 97.0.4692.71-0.1~deb11u1
Done: Andres Salomon <dilin...@debian.org>
We believe that the bug you reported is fixed in the latest version of
chromium, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 995...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andres Salomon <dilin...@debian.org> (supplier of updated chromium package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Thu, 13 Jan 2022 18:30:21 -0500
Source: chromium
Architecture: source
Version: 97.0.4692.71-0.1~deb11u1
Distribution: bullseye-security
Urgency: high
Maintainer: Debian Chromium Team <chrom...@packages.debian.org>
Changed-By: Andres Salomon <dilin...@debian.org>
Closes: 861796 942962 955540 995212 996375
Changes:
chromium (97.0.4692.71-0.1~deb11u1) bullseye-security; urgency=high
.
* Non-maintainer upload.
* Stop building chromium's bunded gn and instead build-dep on generate-ninja.
* Drop numerous patches related to gcc building, since we just build w/
clang.
* Use python3 as default instead of relying on python2
(closes: #942962, #996375).
* Enable the ozone backend in the build (closes: #955540).
* Automatically detect & enable Wayland support when launching chromium
(closes: #861796).
* Rename crashpad_handler to chrome_crashpad_handler.
* No longer hardcode desktop GL implementation as default - it causes
the chromium compositor's draw buffer to fill up & crash on my system.
* Enable official builds.
* New upstream stable release (closes: #995212).
- CVE-2022-0096: Use after free in Storage. Reported by Yangkang
(@dnpushme) of 360 ATA
- CVE-2022-0097: Inappropriate implementation in DevTools. Reported by
David Erceg
- CVE-2022-0098: Use after free in Screen Capture. Reported by
@ginggilBesel
- CVE-2022-0099: Use after free in Sign-in. Reported by Rox
- CVE-2022-0100: Heap buffer overflow in Media streams API. Reported by
Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
Corp. Ltd.
- CVE-2022-0101: Heap buffer overflow in Bookmarks. Reported by raven
(@raid_akame)
- CVE-2022-0102: Type Confusion in V8. Reported by Brendon Tiszka
- CVE-2022-0103: Use after free in SwiftShader. Reported by Abraruddin
Khan and Omair
- CVE-2022-0104: Heap buffer overflow in ANGLE. Reported by Abraruddin
Khan and Omair
- CVE-2022-0105: Use after free in PDF. Reported by Cassidy Kim of Amber
Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
- CVE-2022-0106: Use after free in Autofill. Reported by Khalil Zhani
- CVE-2022-0107: Use after free in File Manager API. Reported by raven
(@raid_akame)
- CVE-2022-0108: Inappropriate implementation in Navigation. Reported by
Luan Herrera (@lbherrera_)
- CVE-2022-0109: Inappropriate implementation in Autofill. Reported by
Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University
- CVE-2022-0110: Incorrect security UI in Autofill. Reported by
Alesandro Ortiz
- CVE-2022-0111: Inappropriate implementation in Navigation. Reported by
garygreen
- CVE-2022-0112: Incorrect security UI in Browser UI. Reported by Thomas
Orlita
- CVE-2022-0113: Inappropriate implementation in Blink. Reported by Luan
Herrera (@lbherrera_)
- CVE-2022-0114: Out of bounds memory access in Web Serial. Reported by
Looben Yang
- CVE-2022-0115: Uninitialized Use in File API. Reported by Mark Brand
of Google Project Zero
- CVE-2022-0116: Inappropriate implementation in Compositing. Reported
by Irvan Kurniawan (sourc7)
- CVE-2022-0117: Policy bypass in Service Workers. Reported by
Dongsung Kim (@kid1ng)
- CVE-2022-0118: Inappropriate implementation in WebShare. Reported by
Alesandro Ortiz
- CVE-2022-0120: Inappropriate implementation in Passwords. Reported by
CHAKRAVARTHI (Ruler96)
(96.0.4664.110)
- CVE-2021-4098: Insufficient data validation in Mojo. Reported by
Sergei Glazunov of Google Project Zero
- CVE-2021-4099: Use after free in Swiftshader. Reported by Aki Helin
of Solita
- CVE-2021-4100: Object lifecycle issue in ANGLE. Reported by Aki Helin
of Solita
- CVE-2021-4101: Heap buffer overflow in Swiftshader. Reported by
Abraruddin Khan and Omair
- CVE-2021-4102: Use after free in V8. Reported by Anonymous
(96.0.4664.93)
- CVE-2021-4052: Use after free in web apps. Reported by Wei Yuan of
MoyunSec VLab
- CVE-2021-4053: Use after free in UI. Reported by Rox
- CVE-2021-4079: Out of bounds write in WebRTC. Reported by Brendon
Tiszka
- CVE-2021-4054: Incorrect security UI in autofill. Reported by
Alesandro Ortiz
- CVE-2021-4078: Type confusion in V8. Reported by Nan
Wang(@eternalsakura13) and Guang Gong of 360 Alpha Lab
- CVE-2021-4055: Heap buffer overflow in extensions. Reported by Chen
Rong
- CVE-2021-4056: Type Confusion in loader. Reported by @__R0ng of 360
Alpha Lab
- CVE-2021-4057: Use after free in file API. Reported by Sergei
Glazunov of Google Project Zero
- CVE-2021-4058: Heap buffer overflow in ANGLE. Reported by Abraruddin
Khan and Omair
- CVE-2021-4059: Insufficient data validation in loader. Reported by
Luan Herrera (@lbherrera_)
- CVE-2021-4061: Type Confusion in V8. Reported by Paolo Severini
- CVE-2021-4062: Heap buffer overflow in BFCache. Reported by Leecraso
and Guang Gong of 360 Alpha Lab
- CVE-2021-4063: Use after free in developer tools. Reported by
Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research
- CVE-2021-4064: Use after free in screen capture. Reported by
@ginggilBesel
- CVE-2021-4065: Use after free in autofill. Reported by 5n1p3r0010
from Topsec ChiXiao Lab
- CVE-2021-4066: Integer underflow in ANGLE. Reported by Jaehun
Jeong(@n3sk) of Theori
- CVE-2021-4067: Use after free in window manager. Reported by
@ginggilBesel
- CVE-2021-4068: Insufficient validation of untrusted input in new tab
page. Reported by NDevTK
(96.0.4664.45)
- CVE-2021-38008: Use after free in media. Reported by Marcin Towalski
- CVE-2021-38009: Inappropriate implementation in cache.
Reported by Luan Herrera (@lbherrera_)
- CVE-2021-38006: Use after free in storage foundation.
Reported by Sergei Glazunov of Google Project Zero
- CVE-2021-38007: Type Confusion in V8. Reported by Polaris Feng and
SGFvamll at Singular Security Lab
- CVE-2021-38005: Use after free in loader.
Reported by Sergei Glazunov of Google Project Zero
- CVE-2021-38010: Inappropriate implementation in service workers.
Reported by Sergei Glazunov of Google Project Zero
- CVE-2021-38011: Use after free in storage foundation.
Reported by Sergei Glazunov of Google Project Zero
- CVE-2021-38012: Type Confusion in V8. Reported by Yonghwi Jin (@jinmo123)
- CVE-2021-38013: Heap buffer overflow in fingerprint recognition.
Reported by raven (@raid_akame)
- CVE-2021-38014: Out of bounds write in Swiftshader.
Reported by Atte Kettunen of OUSPG
- CVE-2021-38015: Inappropriate implementation in input.
Reported by David Erceg
- CVE-2021-38016: Insufficient policy enforcement in background fetch.
Reported by Maurice Dauer
- CVE-2021-38017: Insufficient policy enforcement in iframe sandbox.
Reported by NDevTK
- CVE-2021-38018: Inappropriate implementation in navigation.
Reported by Alesandro Ortiz
- CVE-2021-38019: Insufficient policy enforcement in CORS.
Reported by Maurice Dauer
- CVE-2021-38020: Insufficient policy enforcement in contacts picker.
Reported by Luan Herrera (@lbherrera_)
- CVE-2021-38021: Inappropriate implementation in referrer.
Reported by Prakash (@1lastBr3ath)
- CVE-2021-38022: Inappropriate implementation in WebAuthentication.
Reported by Michal Kepkowski
(95.0.4638.69)
- CVE-2021-37997: Use after free in Sign-In. Reported by Wei Yuan of
MoyunSec VLab
- CVE-2021-37998: Use after free in Garbage Collection. Reported by
Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications
Corp. Ltd.
- CVE-2021-37999: Insufficient data validation in New Tab Page.
Reported by Ashish Arun Dhone
- CVE-2021-38000: Insufficient validation of untrusted input in Intents.
Reported by Clement Lecigne, Neel Mehta, and Maddie Stone of Google
Threat Analysis Group
- CVE-2021-38001: Type Confusion in V8. Reported by @s0rrymybad of
Kunlun Lab via Tianfu Cup
- CVE-2021-38002: Use after free in Web Transport. Reported by @__R0ng
of 360 Alpha Lab, 漏洞研究院青训队 via Tianfu Cup
- CVE-2021-38003: Inappropriate implementation in V8. Reported by Clément
Lecigne from Google TAG and Samuel Groß from Google Project Zero
- CVE-2021-38004: Insufficient policy enforcement in Autofill. Reported
by Mark Amery
(95.0.4638.54)
- CVE-2021-37981: Heap buffer overflow in Skia. Reported by Yangkang
(@dnpushme) of 360 ATA
- CVE-2021-37982: Use after free in Incognito. Reported by Weipeng Jiang
(@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
- CVE-2021-37983: Use after free in Dev Tools. Reported by Zhihua Yao
of KunLun Lab
- CVE-2021-37984: Heap buffer overflow in PDFium. Reported by Antti
Levomäki, Joonas Pihlaja and Christian Jalio from Forcepoint
- CVE-2021-37985: Use after free in V8. Reported by Yangkang (@dnpushme)
of 360 ATA
- CVE-2021-37986: Heap buffer overflow in Settings.
Reported by raven (@raid_akame)
- CVE-2021-37987: Use after free in Network APIs. Reported by
Yangkang (@dnpushme) of 360 ATA
- CVE-2021-37988: Use after free in Profiles. Reported by raven
(@raid_akame)
- CVE-2021-37989: Inappropriate implementation in Blink.
Reported by Matt Dyas, Ankur Sundara
- CVE-2021-37990: Inappropriate implementation in WebView. Reported by
Kareem Selim of CyShield
- CVE-2021-37991: Race in V8. Reported by Samuel Groß of Google Project
Zero
- CVE-2021-37992: Out of bounds read in WebAudio. Reported by
sunburst@Ant Security Light-Year Lab
- CVE-2021-37993: Use after free in PDF Accessibility. Reported by Cassidy
Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd.
- CVE-2021-37996: Insufficient validation of untrusted input in Downloads.
Reported by Anonymous
- CVE-2021-37994: Inappropriate implementation in iFrame Sandbox.
Reported by David Erceg
- CVE-2021-37995: Inappropriate implementation in WebApp Installer.
Reported by Terence Eden
(94.0.4606.81)
- CVE-2021-37977: Use after free in Garbage Collection. Reported by
Anonymous
- CVE-2021-37978: Heap buffer overflow in Blink. Reported by Yangkang
(@dnpushme) of 360 ATA
- CVE-2021-37979: Heap buffer overflow in WebRTC. Reported by Marcin
Towalski of Cisco Talos
- CVE-2021-37980: Inappropriate implementation in Sandbox. Reported by
Yonghwi Jin (@jinmo123) of Theori
(94.0.4606.71)
- CVE-2021-37974: Use after free in Safe Browsing. Reported by Weipeng
Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group
- CVE-2021-37975: Use after free in V8. Reported by Anonymous
- CVE-2021-37976: Information leak in core. Reported by Clément Lecigne
from Google TAG, with technical assistance from Sergei Glazunov and
Mark Brand from Google Project Zero
(94.0.4606.61)
- CVE-2021-37973: Use after free in Portals. Reported by Clément Lecigne
from Google TAG, with technical assistance from Sergei Glazunov and
Mark Brand from Google Project Zero
(94.0.4606.54)
- CVE-2021-37956 Use after free in Offline use. Reported by Huyna at
Viettel Cyber Security
- CVE-2021-37957: Use after free in WebGPU. Reported by Looben Yang
- CVE-2021-37958: Inappropriate implementation in Navigation. Reported by
James Lee (@Windowsrcer)
- CVE-2021-37959: Use after free in Task Manager. Reported by raven
(@raid_akame)
- CVE-2021-37961: Use after free in Tab Strip. Reported by Khalil Zhani
- CVE-2021-37962: Use after free in Performance Manager. Reported by Sri
- CVE-2021-37963: Side-channel information leakage in DevTools. Reported
by Daniel Genkin and Ayush Agarwal, University of Michigan, Eyal Ronen
and Shaked Yehezkel, Tel Aviv University, Sioli O’Connell, University of
Adelaide, and Jason Kim, Georgia Institute of Technology
- CVE-2021-37964: Inappropriate implementation in ChromeOS Networking.
Reported by Hugo Hue and Sze Yiu Chau of the Chinese University of Hong
Kong
- CVE-2021-37965: Inappropriate implementation in Background Fetch API.
Reported by Maurice Dauer
- CVE-2021-37966: Inappropriate implementation in Compositing. Reported by
Mohit Raj (shadow2639)
- CVE-2021-37967: Inappropriate implementation in Background Fetch API.
Reported by SorryMybad (@S0rryMybad) of Kunlun Lab
- CVE-2021-37968: Inappropriate implementation in Background Fetch API.
Reported by Maurice Dauer
- CVE-2021-37969: Inappropriate implementation in Google Updater. Reported
by Abdelhamid Naceri (halov)
- CVE-2021-37970: Use after free in File System API. Reported by
SorryMybad (@S0rryMybad) of Kunlun Lab
- CVE-2021-37971: Incorrect security UI in Web Browser UI. Reported by
Rayyan Bijoora
- CVE-2021-37972: Out of bounds read in libjpeg-turbo. Reported by Xu
Hanyu and Lu Yutao from Panguite-Forensics-Lab of Qianxin
Checksums-Sha1:
75ff28b7b22b585c19b8849a230af234c3ae6b06 3779
chromium_97.0.4692.71-0.1~deb11u1.dsc
3616e212d6f12237ef3110ac8925eeb0b01ba626 516819808
chromium_97.0.4692.71.orig.tar.xz
f152b65765c74eeaff9a687e5f04c68683f1747c 152972
chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
9a313b86d9929c4ab88b5c30b2488eb9842cca8f 25423
chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo
Checksums-Sha256:
b544dcf4305d8a8b26e6735297e80dad38833bed4f64d02d76690dac0f8d5bd3 3779
chromium_97.0.4692.71-0.1~deb11u1.dsc
cca093107bf6991b4777889012646455f8e520b446c9f27250653f98ed4bb7e0 516819808
chromium_97.0.4692.71.orig.tar.xz
c580ae26caf4634eb4f29ad24f7caa0f1de0d149d2d11532a77f4a53f1a58eb5 152972
chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
04571c8941bb500b3b9bf56ebb926a9c6997d76bc64957942747b48a7354e3f6 25423
chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo
Files:
87822041004430424c90ae9efcb9579e 3779 web optional
chromium_97.0.4692.71-0.1~deb11u1.dsc
88cfb419d88af08f2925b9e6efb3921e 516819808 web optional
chromium_97.0.4692.71.orig.tar.xz
f0dbf9d8bdf53260d7aba6823c174edc 152972 web optional
chromium_97.0.4692.71-0.1~deb11u1.debian.tar.xz
9a29fa7149c2f2a9d0cb60c3ebcda2fa 25423 web optional
chromium_97.0.4692.71-0.1~deb11u1_source.buildinfo
-----BEGIN PGP SIGNATURE-----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=d8kj
-----END PGP SIGNATURE-----
--- End Message ---