-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Apr 2026 03:34:02 -0400
Source: chromium
Binary: chromium chromium-common chromium-common-dbgsym chromium-dbgsym chromium-driver chromium-headless-shell chromium-headless-shell-dbgsym chromium-sandbox chromium-sandbox-dbgsym chromium-shell chromium-shell-dbgsym
Architecture: ppc64el
Version: 147.0.7727.55-1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: ppc64el Build Daemon (ppc64el-osuosl-02) <buildd_ppc64el-ppc64el-osuosl-02@buildd.debian.org>
Changed-By: Andres Salomon <dilinger@debian.org>
Description:
 chromium   - web browser
 chromium-common - web browser - common resources used by the chromium packages
 chromium-driver - web browser - WebDriver support
 chromium-headless-shell - web browser - old headless shell
 chromium-sandbox - web browser - setuid security sandbox for chromium
 chromium-shell - web browser - minimal shell
Closes: 1132651
Changes:
 chromium (147.0.7727.55-1~deb12u1) bookworm-security; urgency=high
 .
   [ Andres Salomon ]
   * New upstream stable release.
     - CVE-2026-5858: Heap buffer overflow in WebML.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5859: Integer overflow in WebML. Reported by Anonymous.
     - CVE-2026-5860: Use after free in WebRTC.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5861: Use after free in V8. Reported by 5shain.
     - CVE-2026-5862: Inappropriate implementation in V8. Reported by Google.
     - CVE-2026-5863: Inappropriate implementation in V8. Reported by Google.
     - CVE-2026-5864: Heap buffer overflow in WebAudio. Reported by Syn4pse.
     - CVE-2026-5865: Type Confusion in V8.
       Reported by Project WhatForLunch (@pjwhatforlunch).
     - CVE-2026-5866: Use after free in Media.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5867: Heap buffer overflow in WebML. Reported by Syn4pse.
     - CVE-2026-5868: Heap buffer overflow in ANGLE. Reported by cinzinga.
     - CVE-2026-5869: Heap buffer overflow in WebML.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5870: Integer overflow in Skia. Reported by Google.
     - CVE-2026-5871: Type Confusion in V8. Reported by Google.
     - CVE-2026-5872: Use after free in Blink. Reported by Google.
     - CVE-2026-5873: Out of bounds read and write in V8. Reported by Google.
     - CVE-2026-5874: Use after free in PrivateAI. Reported by Krace.
     - CVE-2026-5875: Policy bypass in Blink.
       Reported by Lyra Rebane (rebane2001).
     - CVE-2026-5876: Side-channel information leakage in Navigation.
       Reported by Lyra Rebane (rebane2001).
     - CVE-2026-5877: Use after free in Navigation.
       Reported by Cassidy Kim(@cassidy6564).
     - CVE-2026-5878: Incorrect security UI in Blink.
       Reported by Shaheen Fazim.
     - CVE-2026-5879: Insufficient validation of untrusted input in ANGLE.
       Reported by parkminchan, working for SSD Labs Korea.
     - CVE-2026-5880: Incorrect security UI in browser UI.
     - CVE-2026-5881: Policy bypass in LocalNetworkAccess. Reported by asnine.
     - CVE-2026-5882: Incorrect security UI in Fullscreen.
     - CVE-2026-5883: Use after free in Media. Reported by sherkito.
     - CVE-2026-5884: Insufficient validation of untrusted input in Media.
       Reported by xmzyshypnc.
     - CVE-2026-5885: Insufficient validation of untrusted input in WebML.
       Reported by Bryan Bernhart.
     - CVE-2026-5886: Out of bounds read in WebAudio.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5887: Insufficient validation of untrusted input in Downloads.
       Reported by daffainfo.
     - CVE-2026-5888: Uninitialized Use in WebCodecs. Reported by Identified by
       the Octane Security Team: Giovanni Vignone, Paolo Gentry,
       Robert van Eijk.
     - CVE-2026-5889: Cryptographic Flaw in PDFium. Reported by mlafon.
     - CVE-2026-5890: Race in WebCodecs. Reported by Casper Woudenberg.
     - CVE-2026-5891: Insufficient policy enforcement in browser UI.
       Reported by Tianyi Hu.
     - CVE-2026-5892: Insufficient policy enforcement in PWAs.
       Reported by Tianyi Hu.
     - CVE-2026-5893: Race in V8. Reported by QYmag1c.
     - CVE-2026-5894: Inappropriate implementation in PDF.
       Reported by Povcfe of Tencent Security Xuanwu Lab.
     - CVE-2026-5895: Incorrect security UI in Omnibox.
       Reported by Renwa Hiwa @RenwaX23.
     - CVE-2026-5896: Policy bypass in Audio.
       Reported by Luan Herrera (@lbherrera_).
     - CVE-2026-5897: Incorrect security UI in Downloads.
       Reported by Farras Givari.
     - CVE-2026-5898: Incorrect security UI in Omnibox.
       Reported by saidinahikam032.
     - CVE-2026-5899: Incorrect security UI in History Navigation.
       Reported by Islam Rzayev.
     - CVE-2026-5900: Policy bypass in Downloads.
       Reported by Luan Herrera (@lbherrera_).
     - CVE-2026-5901: Policy bypass in DevTools.
       Reported by Povcfe of Tencent Security Xuanwu Lab.
     - CVE-2026-5902: Race in Media. Reported by Luke Francis.
     - CVE-2026-5903: Policy bypass in IFrameSandbox. Reported by @Ciarands.
     - CVE-2026-5904: Use after free in V8.
       Reported by Zhenpeng (Leo) Lin at depthfirst.
     - CVE-2026-5905: Incorrect security UI in Permissions.
       Reported by daffainfo.
     - CVE-2026-5906: Incorrect security UI in Omnibox.
       Reported by mohamedhesham9173.
     - CVE-2026-5907: Insufficient data validation in Media.
       Reported by Luke Francis.
     - CVE-2026-5908: Integer overflow in Media.
       Reported by Ameen Basha M K & Mohammed Yasar B.
     - CVE-2026-5909: Integer overflow in Media.
       Reported by Mohammed Yasar B & Ameen Basha M K.
     - CVE-2026-5910: Integer overflow in Media.
       Reported by Ameen Basha M K & Mohammed Yasar B.
     - CVE-2026-5911: Policy bypass in ServiceWorkers. Reported by lebr0nli
       of National Yang Ming Chiao Tung University, Dept. of CS, Security
       and Systems Lab.
     - CVE-2026-5912: Integer overflow in WebRTC.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-5913: Out of bounds read in Blink.
       Reported by Vitaly Simonovich.
     - CVE-2026-5914: Type Confusion in CSS. Reported by Syn4pse.
     - CVE-2026-5915: Insufficient validation of untrusted input in WebML.
       Reported by ningxin.hu@intel.com.
     - CVE-2026-5918: Inappropriate implementation in Navigation.
       Reported by Google.
     - CVE-2026-5919: Insufficient validation of untrusted input in WebSockets.
       Reported by Richard Belisle.
   * d/patches:
     - upstream/profile.patch: drop, merged upstream.
     - upstream/fix-boringssl-loong64.patch: drop, merged upstream.
     - debianization/clang-version.patch: refresh.
     - disable/signin.patch: refresh.
     - disable/catapult.patch: refresh.
     - disable/unrar.patch: drop, merged upstream.
     - trixie/nodejs-set-intersection.patch: update for upstream refactoring.
     - bookworm/clang19.patch: -fno-lifetime-dse is unsupported. Also move
       to llvm-19 directory.
     - ungoogled/disable-ai.patch: sync from ungoogled-chromium project.
       Also re-add code that creates new tab's search bar (closes: #1132651).
     - debianization/safe-libcxx.patch: add a patch to force building with
       libc++'s LIBCPP_HARDENING_MODE turned on. See
       https://issues.chromium.org/issues/485696265 for the
       (security-related) rationale.
     - llvm-19/static-assert.patch: add another chunk of static_assert()
       removals that clang 19 needs.
     - rust-1.85/image.patch: enable nightly features for image_v0.25
       [trixie, bookworm].
     - bookworm/constexpr.patch: update/refresh for renamed file [bookworm].
   * d/rules:
     - drop "enable_glic=false", as upstream now forces their AI on everyone;
       but we strip it out with ungoogled/disable-ai.patch.
 .
   [ Daniel Richard G. ]
   * d/patches:
     - bookworm/gn-absl.patch: Add visibility specifier to absl/crc:crc32,
       and re-sort the patch to keep the edits organized.
     - trixie/gn-len.patch: Refresh.
     - trixie/gn-module-name.patch: New patch to address older GN not knowing
       about the {{cc_module_name}} substitution [trixie, bookworm].
 .
   [ Timothy Pearson ]
   * d/patches/ppc64le:
     - third_party/0001-Add-PPC64-support-for-boringssl.patch: refresh for
       upstream changes
     - third_party/0002-third_party-libvpx-Remove-bad-ppc64-config.patch:
       refresh for upstream changes
     - third_party/0002-regenerate-xnn-buildgn.patch: refresh for upstream
       changes
     - libaom/0001-Add-pregenerated-config-for-libaom-on-ppc64.patch: regenerate
 .
   [ Jianfeng Liu ]
   * d/patches/loongarch64:
     - 0024-disable-BROTLI_MODEL-macro-for-some-targets.patch: add upstream
       patch to fix brotil on loong64
Checksums-Sha1:
 41d9c6d82ac44fb7078f9fa86b9f7c28a8c52315 6041548 chromium-common-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 18f1c42e023d8ab4abbbe35f1cdb157ec0ec187f 32168340 chromium-common_147.0.7727.55-1~deb12u1_ppc64el.deb
 87c22173ba11b4a5fa208aecf97585e949b5eaa0 32003472 chromium-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 c557e5c87c4896824d1dee81897078b08b902fe3 7755116 chromium-driver_147.0.7727.55-1~deb12u1_ppc64el.deb
 12aef0359e5edc69a15ab99e30472ef147044d71 25445980 chromium-headless-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 b9601de93177c97792bc185f2607371e9418a6fa 55885712 chromium-headless-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 8ae8a6d6e65aacbba999e4a91dd0d0b71be62379 19252 chromium-sandbox-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 29bfddb863b6bea87efe9e64cb964ab5162eed4b 115868 chromium-sandbox_147.0.7727.55-1~deb12u1_ppc64el.deb
 60d0f2f746d0a44b2dfaa33b5afe797e18f94c84 27577080 chromium-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 cd75bc23fe518d607c76159178436639a065b748 60894312 chromium-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 759fe1ff48582f64b992cff616005a4804c6561d 30314 chromium_147.0.7727.55-1~deb12u1_ppc64el-buildd.buildinfo
 127f03a4042c1ecf87003a3990e4c24e8a7db456 73207000 chromium_147.0.7727.55-1~deb12u1_ppc64el.deb
Checksums-Sha256:
 289d725fb05f4bfe562a8d00e9ed8b1e9d0c3894327a39669a577f515030332e 6041548 chromium-common-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 2e496fdd8a2bbdfdf12b818e266b13248a30cb958ba9ff14f2489fd5fc11e76e 32168340 chromium-common_147.0.7727.55-1~deb12u1_ppc64el.deb
 10bcc5a384ce0bc276cb6d2b5d7bf425b191e0e63915bf012a347151717c48f4 32003472 chromium-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 25dc7813c0f44275dcfef93c038194e59430656c5638df3e39bfbbc970894537 7755116 chromium-driver_147.0.7727.55-1~deb12u1_ppc64el.deb
 b9a8724863a97401b06a68686b48ce1da6e793d415d00cdeeab403ec0856a404 25445980 chromium-headless-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 3115ccbd373ccf4ee01faae555fd5d39646dc7399f28170836a3bef6091d4379 55885712 chromium-headless-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 edd4acfc1a4f59a607c8afd7137db5e17a0c2f55e7eff154c446d53deb881b2f 19252 chromium-sandbox-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 35642dcf9c1267b043a64f7110b4c8e910f01142251f93c7495c3d42b71b1795 115868 chromium-sandbox_147.0.7727.55-1~deb12u1_ppc64el.deb
 34e41d24c06454a66dd1be28c1ba400ccc27ccef04f194535c786510f7becf33 27577080 chromium-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 9a3ebcdbe83a4bc397e5b65bcac51c729efa86fe56bec6871c23e8f7776ec7b1 60894312 chromium-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 505c857c46024e6d2b6b7a228f5738d3f82aa4c6cf285e059bf9b6e879c03cdf 30314 chromium_147.0.7727.55-1~deb12u1_ppc64el-buildd.buildinfo
 ac8d958c52f12c0f0691ccf57c0f9efa2568de6da943bc827c07925535acc2dd 73207000 chromium_147.0.7727.55-1~deb12u1_ppc64el.deb
Files:
 379454ea3a9e46d4c0f0c86a0df808f7 6041548 debug optional chromium-common-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 6ae4820c74c2f37a194c78150bffcd95 32168340 web optional chromium-common_147.0.7727.55-1~deb12u1_ppc64el.deb
 d00451a8497cc82d7d9a4eda86c90bc3 32003472 debug optional chromium-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 cce058422796712aeb66e43c65129f8c 7755116 web optional chromium-driver_147.0.7727.55-1~deb12u1_ppc64el.deb
 bf09293c6fcc403811fa158fc9eda8b6 25445980 debug optional chromium-headless-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 b368ad08d324cbce004ec000444aacb0 55885712 web optional chromium-headless-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 c7c022d3a4fe5cee2ae1b1677567a065 19252 debug optional chromium-sandbox-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 9d2eac1c4d0616e0c6761f8312ffd403 115868 web optional chromium-sandbox_147.0.7727.55-1~deb12u1_ppc64el.deb
 eccbb94a1034a0a05181e8904ad5b689 27577080 debug optional chromium-shell-dbgsym_147.0.7727.55-1~deb12u1_ppc64el.deb
 770d855fdf56c28780d71a36d738ee95 60894312 web optional chromium-shell_147.0.7727.55-1~deb12u1_ppc64el.deb
 246e9e76553ef9aa2c073157d9079ec4 30314 web optional chromium_147.0.7727.55-1~deb12u1_ppc64el-buildd.buildinfo
 1b111dca1d44b2b235e091bd6fb2f83c 73207000 web optional chromium_147.0.7727.55-1~deb12u1_ppc64el.deb

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEYo4fOZBRi9qmvTxH1PowSTJ8+YQFAmnZGLMACgkQ1PowSTJ8
+YQPHhAAgV8QkcSOyV/woS1ZdcxOZoTy+l3g48/ugRZwag2cVwvpIyG1ulrR7Zfo
Y1E5p/wijGm2vGjC9thPPVtqT+pfyP+APqaxuUXvrwuYnUJsaz+BEsMnw4OYxnfq
mfmy2qBU1ADdfSopl3Ugx+3PeN7KlUb9CMKHbgpaQZFOZzgXIPyJ2S+w1qdbWvoC
lW5/qNxkk51RIyuFjBEBrnL/wgYO+9/C0VqlLANCsTWBDa0hqBsHTzfdb6Fd3fZv
tlFJWQ393uEN3UkVZc12jbLpNNbzK9MMTVwYRvNQKyeb9N2fldf3AwRxDOncEHlp
nbBwtoZ+MzZ5B8qbX0mpJnIMvM3wTtrpTCt6kukq+VybBhvB2Wy6fkn9UaNtNOob
X6XAQJQnLXF1cX6SnHuiFCelmA/CqEc+NJtzkJKcWS8RoBBjpFZS4VkBMsgVi8E0
4CZaFHKwNi+bmifFV7YzQS+vroWQUhm7ZVvmemwmTlUl3SadRFaWSmAeU3dFvyli
62ei5YMwTu51gaymyHz9RP1UXeowR8o9+W/o/7X0qRWeTjRvDnUDvHs3QXgjAAQl
iKxFrlFPAWqv10UicNCtrmeZlYBzZsqOicaHOCOj/HFvjOmAQIDNqqjHhvGv1/QU
stAQ0mD5v0xSlon55/r+irroP5I3gEbP17tLePn/GyR4a1yIhKY=
=49Si
-----END PGP SIGNATURE-----
