* Upstream release: 99.0.4844.51
- CVE-2022-0789: Heap buffer overflow in ANGLE.
- CVE-2022-0790: Use after free in Cast UI.
- CVE-2022-0791: Use after free in Omnibox.
- CVE-2022-0792: Out of bounds read in ANGLE.
- CVE-2022-0793: Use after free in Views.
- CVE-2022-0794: Use after free in WebShare.
- CVE-2022-0795: Type Confusion in Blink Layout.
- CVE-2022-0796: Use after free in Media.
- CVE-2022-0797: Out of bounds memory access in Mojo.
- CVE-2022-0798: Use after free in MediaStream.
- CVE-2022-0799: Insufficient policy enforcement in Installer.
- CVE-2022-0800: Heap buffer overflow in Cast UI.
- CVE-2022-0801: Inappropriate implementation in HTML parser.
- CVE-2022-0802: Inappropriate implementation in Full screen mode.
- CVE-2022-0803: Inappropriate implementation in Permissions.
- CVE-2022-0804: Inappropriate implementation in Full screen mode.
- CVE-2022-0805: Use after free in Browser Switcher.
- CVE-2022-0806: Data leak in Canvas.
- CVE-2022-0807: Inappropriate implementation in Autofill.
- CVE-2022-0808: Use after free in Chrome OS Shell.
- CVE-2022-0809: Out of bounds memory access in WebXR.
* debian/rules: exclude unnecessary build artifacts (LP: #1961565)
* debian/patches/arm64-no-pointer-authentication.patch: added
* debian/patches/build-with-old-libva-missing-defines.patch: refreshed
* debian/patches/build-with-old-libva-no-av1.patch: refreshed
* debian/patches/configuration-directory.patch: refreshed
* debian/patches/define__libc_malloc.patch: updated
* debian/patches/gn-no-std-equal_to.patch: added
* debian/patches/libaom-armhf-build-cpudetect.patch: refreshed
* debian/patches/revert-sequence-checker-capability-name.patch: refreshed
* debian/patches/search-credit.patch: refreshed
* debian/patches/set-rpath-on-chromium-executables.patch: refreshed
* debian/patches/suppress-newer-clang-warning-flags.patch: refreshed
* debian/patches/use-clang-versioned.patch: refreshed
* debian/patches/widevine-enable-version-string.patch: refreshed
This bug was fixed in the package chromium-browser - 99.0.4844. 51-0ubuntu0. 18.04.1
--------------- 51-0ubuntu0. 18.04.1) bionic; urgency=medium
chromium-browser (99.0.4844.
* Upstream release: 99.0.4844.51 patches/ arm64-no- pointer- authentication. patch: added patches/ build-with- old-libva- missing- defines. patch: refreshed patches/ build-with- old-libva- no-av1. patch: refreshed patches/ configuration- directory. patch: refreshed patches/ define_ _libc_malloc. patch: updated patches/ gn-no-std- equal_to. patch: added patches/ libaom- armhf-build- cpudetect. patch: refreshed patches/ revert- sequence- checker- capability- name.patch: refreshed patches/ search- credit. patch: refreshed patches/ set-rpath- on-chromium- executables. patch: refreshed patches/ suppress- newer-clang- warning- flags.patch: refreshed patches/ use-clang- versioned. patch: refreshed patches/ widevine- enable- version- string. patch: refreshed
- CVE-2022-0789: Heap buffer overflow in ANGLE.
- CVE-2022-0790: Use after free in Cast UI.
- CVE-2022-0791: Use after free in Omnibox.
- CVE-2022-0792: Out of bounds read in ANGLE.
- CVE-2022-0793: Use after free in Views.
- CVE-2022-0794: Use after free in WebShare.
- CVE-2022-0795: Type Confusion in Blink Layout.
- CVE-2022-0796: Use after free in Media.
- CVE-2022-0797: Out of bounds memory access in Mojo.
- CVE-2022-0798: Use after free in MediaStream.
- CVE-2022-0799: Insufficient policy enforcement in Installer.
- CVE-2022-0800: Heap buffer overflow in Cast UI.
- CVE-2022-0801: Inappropriate implementation in HTML parser.
- CVE-2022-0802: Inappropriate implementation in Full screen mode.
- CVE-2022-0803: Inappropriate implementation in Permissions.
- CVE-2022-0804: Inappropriate implementation in Full screen mode.
- CVE-2022-0805: Use after free in Browser Switcher.
- CVE-2022-0806: Data leak in Canvas.
- CVE-2022-0807: Inappropriate implementation in Autofill.
- CVE-2022-0808: Use after free in Chrome OS Shell.
- CVE-2022-0809: Out of bounds memory access in WebXR.
* debian/rules: exclude unnecessary build artifacts (LP: #1961565)
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
* debian/
-- Olivier Tilloy <email address hidden> Tue, 01 Mar 2022 21:43:44 +0100