-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 06 May 2026 16:32:51 -0400
Source: chromium
Binary: chromium chromium-common chromium-common-dbgsym chromium-dbgsym chromium-driver chromium-headless-shell chromium-headless-shell-dbgsym chromium-sandbox chromium-sandbox-dbgsym chromium-shell chromium-shell-dbgsym
Architecture: amd64
Version: 148.0.7778.96-1~deb12u1
Distribution: bookworm-security
Urgency: high
Maintainer: all / amd64 / i386 Build Daemon (x86-conova-02) <buildd_amd64-x86-conova-02@buildd.debian.org>
Changed-By: Andres Salomon <dilinger@debian.org>
Description:
 chromium   - web browser
 chromium-common - web browser - common resources used by the chromium packages
 chromium-driver - web browser - WebDriver support
 chromium-headless-shell - web browser - old headless shell
 chromium-sandbox - web browser - setuid security sandbox for chromium
 chromium-shell - web browser - minimal shell
Changes:
 chromium (148.0.7778.96-1~deb12u1) bookworm-security; urgency=high
 .
   [ Andres Salomon ]
   * New upstream stable release.
     - CVE-2026-7896: Integer overflow in Blink.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-7897: Use after free in Mobile. Reported by Google.
     - CVE-2026-7898: Use after free in Chromoting. Reported by Google.
     - CVE-2026-7899: Out of bounds read and write in V8.
       Reported by Project WhatForLunch (@pjwhatforlunch).
     - CVE-2026-7900: Heap buffer overflow in ANGLE. Reported by Anonymous.
     - CVE-2026-7901: Use after free in ANGLE. Reported by Syn4pse (@ret2happy)
     - CVE-2026-7902: Out of bounds memory access in V8.
       Reported by JunYoung Park(@candymate) of KAIST Hacking Lab.
     - CVE-2026-7903: Integer overflow in ANGLE. Reported by heesun.
     - CVE-2026-7904: Out of bounds read in Fonts.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-7905: Insufficient validation of untrusted input in Media.
       Reported by Google.
     - CVE-2026-7906: Use after free in SVG. Reported by Google.
     - CVE-2026-7907: Use after free in DOM. Reported by Google.
     - CVE-2026-7908: Use after free in Fullscreen. Reported by Google.
     - CVE-2026-7909: Inappropriate implementation in ServiceWorker.
       Reported by Google.
     - CVE-2026-7910: Use after free in Views. Reported by Google.
     - CVE-2026-7911: Use after free in Aura. Reported by Google.
     - CVE-2026-7912: Integer overflow in GPU. Reported by Google.
     - CVE-2026-7913: Insufficient policy enforcement in DevTools.
       Reported by Google.
     - CVE-2026-7914: Type Confusion in Accessibility. Reported by Google.
     - CVE-2026-7915: Insufficient data validation in DevTools.
       Reported by Google.
     - CVE-2026-7916: Insufficient data validation in InterestGroups.
       Reported by Google.
     - CVE-2026-7917: Use after free in Fullscreen. Reported by Google.
     - CVE-2026-7918: Use after free in GPU. Reported by Google.
     - CVE-2026-7919: Use after free in Aura. Reported by Google.
     - CVE-2026-7920: Use after free in Skia. Reported by Google.
     - CVE-2026-7921: Use after free in Passwords. Reported by Google.
     - CVE-2026-7922: Use after free in ServiceWorker. Reported by Google.
     - CVE-2026-7923: Out of bounds write in Skia. Reported by Google.
     - CVE-2026-7924: Uninitialized Use in Dawn. Reported by Google.
     - CVE-2026-7925: Use after free in Chromoting. Reported by Google.
     - CVE-2026-7926: Use after free in PresentationAPI. Reported by anonymous
     - CVE-2026-7927: Type Confusion in Runtime. Reported by Google.
     - CVE-2026-7928: Use after free in WebRTC. Reported by Google.
     - CVE-2026-7929: Use after free in MediaRecording. Reported by Google.
     - CVE-2026-7930: Insufficient validation of untrusted input in Cookies.
       Reported by Satoki.
     - CVE-2026-7931: Insufficient validation of untrusted input in iOS.
       Reported by Qadhafy Muhammad Tera.
     - CVE-2026-7932: Insufficient policy enforcement in Downloads.
       Reported by Povcfe of Tencent Security Xuanwu Lab.
     - CVE-2026-7933: Out of bounds read in WebCodecs.
       Reported by heapracer (@heapracer).
     - CVE-2026-7934: Insufficient validation of untrusted input in
       Popup Blocker. Reported by Google.
     - CVE-2026-7935: Inappropriate implementation in Speech.
       Reported by Qadhafy Muhammad Tera.
     - CVE-2026-7936: Object lifecycle issue in V8. Reported by Christian Holler.
     - CVE-2026-7937: Insufficient policy enforcement in DevTools. Reported by
       lebr0nli of National Yang Ming Chiao Tung University, Dept. of CS,
       Security and Systems Lab.
     - CVE-2026-7938: Use after free in CSS.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-7939: Inappropriate implementation in SanitizerAPI.
       Reported by s3zer0.
     - CVE-2026-7940: Use after free in V8. Reported by sakana.
     - CVE-2026-7941: Insufficient validation of untrusted input in Mobile.
       Reported by Adithya Kotian.
     - CVE-2026-7942: Integer overflow in ANGLE. Reported by Google.
     - CVE-2026-7943: Insufficient validation of untrusted input in ANGLE.
       Reported by 86ac1f1587b71893ed2ad792cd7dde32.
     - CVE-2026-7944: Insufficient validation of untrusted input
       in Persistent Cache. Reported by Google.
     - CVE-2026-7945: Insufficient validation of untrusted input in COOP.
       Reported by Google.
     - CVE-2026-7946: Insufficient policy enforcement in WebUI.
       Reported by Google.
     - CVE-2026-7947: Insufficient validation of untrusted input in Network.
       Reported by Google.
     - CVE-2026-7948: Race in Chromoting. Reported by Google.
     - CVE-2026-7949: Out of bounds read in Skia. Reported by Google.
     - CVE-2026-7950: Out of bounds read and write in GFX. Reported by Google.
     - CVE-2026-7951: Out of bounds write in WebRTC.
       Reported by soft.connect.fr.
     - CVE-2026-7952: Insufficient policy enforcement in Extensions.
       Reported by Google.
     - CVE-2026-7953: Insufficient validation of untrusted input in Omnibox.
       Reported by Google.
     - CVE-2026-7954: Race in Shared Storage. Reported by Google.
     - CVE-2026-7955: Uninitialized Use in GPU. Reported by Google.
     - CVE-2026-7956: Use after free in Navigation. Reported by Google.
     - CVE-2026-7957: Out of bounds write in Media. Reported by Google.
     - CVE-2026-7958: Inappropriate implementation in ServiceWorker.
       Reported by Google.
     - CVE-2026-7959: Inappropriate implementation in Navigation.
       Reported by Google.
     - CVE-2026-7960: Race in Speech. Reported by Google.
     - CVE-2026-7961: Insufficient validation of untrusted input in Permissions
       Reported by Google.
     - CVE-2026-7962: Insufficient policy enforcement in DirectSockets.
       Reported by Google.
     - CVE-2026-7963: Inappropriate implementation in ServiceWorker.
       Reported by Google.
     - CVE-2026-7964: Insufficient validation of untrusted input in FileSystem.
       Reported by Google.
     - CVE-2026-7965: Insufficient validation of untrusted input in DevTools.
       Reported by Google.
     - CVE-2026-7966: Insufficient validation of untrusted input
       in SiteIsolation. Reported by Google.
     - CVE-2026-7967: Insufficient validation of untrusted input in Navigation.
       Reported by Google.
     - CVE-2026-7968: Insufficient validation of untrusted input in CORS.
       Reported by Google.
     - CVE-2026-7969: Integer overflow in Network. Reported by Google.
     - CVE-2026-7970: Use after free in TopChrome. Reported by Google.
     - CVE-2026-7971: Inappropriate implementation in ORB. Reported by Google.
     - CVE-2026-7972: Uninitialized Use in GPU. Reported by Google.
     - CVE-2026-7973: Integer overflow in Dawn. Reported by Google.
     - CVE-2026-7974: Use after free in Blink. Reported by Google.
     - CVE-2026-7975: Use after free in DevTools. Reported by Google.
     - CVE-2026-7976: Use after free in Views. Reported by Google.
     - CVE-2026-7977: Inappropriate implementation in Canvas.
       Reported by Google.
     - CVE-2026-7978: Inappropriate implementation in Companion.
       Reported by Google.
     - CVE-2026-7979: Inappropriate implementation in Media. Reported by Google
     - CVE-2026-7980: Use after free in WebAudio. Reported by Google.
     - CVE-2026-7981: Out of bounds read in Codecs. Reported by Google.
     - CVE-2026-7982: Uninitialized Use in WebCodecs. Reported by Google.
     - CVE-2026-7983: Out of bounds read in Dawn. Reported by Google.
     - CVE-2026-7984: Use after free in ReadingMode. Reported by Google.
     - CVE-2026-7985: Use after free in GPU. Reported by Google.
     - CVE-2026-7986: Insufficient policy enforcement in Autofill.
       Reported by Google.
     - CVE-2026-7987: Use after free in WebRTC. Reported by Google.
     - CVE-2026-7988: Type Confusion in WebRTC. Reported by Google.
     - CVE-2026-7989: Insufficient data validation in DataTransfer.
       Reported by Google.
     - CVE-2026-7990: Insufficient validation of untrusted input in Updater.
       Reported by Google.
     - CVE-2026-7991: Use after free in UI. Reported by Google.
     - CVE-2026-7992: Insufficient validation of untrusted input in UI.
       Reported by Google.
     - CVE-2026-7993: Insufficient validation of untrusted input in Payments.
       Reported by Google.
     - CVE-2026-7994: Inappropriate implementation in Chromoting.
       Reported by Google.
     - CVE-2026-7995: Out of bounds read in AdFilter. Reported by Google.
     - CVE-2026-7996: Insufficient validation of untrusted input in SSL.
       Reported by heesun.
     - CVE-2026-7997: Insufficient validation of untrusted input in Updater.
       Reported by ochkofficial.
     - CVE-2026-7998: Insufficient validation of untrusted input in Dialog.
       Reported by Tianyi Hu.
     - CVE-2026-7999: Inappropriate implementation in V8.
       Reported by Taisic Yun (@taisic) of Theori.
     - CVE-2026-8000: Insufficient validation of untrusted input
       in ChromeDriver. Reported by Ryan Jupp - HAAO.
     - CVE-2026-8001: Use after free in Printing.
       Reported by c6eed09fc8b174b0f3eebedcceb1e792.
     - CVE-2026-8002: Use after free in Audio. Reported by Google.
     - CVE-2026-8003: Insufficient validation of untrusted input in TabGroups.
       Reported by Google.
     - CVE-2026-8004: Insufficient policy enforcement in DevTools.
       Reported by Google.
     - CVE-2026-8005: Insufficient validation of untrusted input in Cast.
       Reported by Google.
     - CVE-2026-8006: Insufficient policy enforcement in DevTools.
       Reported by Google.
     - CVE-2026-8007: Insufficient validation of untrusted input in Cast.
       Reported by Google.
     - CVE-2026-8008: Inappropriate implementation in DevTools.
       Reported by Google.
     - CVE-2026-8009: Inappropriate implementation in Cast. Reported by Google.
     - CVE-2026-8010: Insufficient validation of untrusted input
       in SiteIsolation. Reported by Google.
     - CVE-2026-8011: Insufficient policy enforcement in Search.
       Reported by Google.
     - CVE-2026-8012: Inappropriate implementation in MHTML. Reported by Google
     - CVE-2026-8013: Insufficient validation of untrusted input in FedCM.
       Reported by Google.
     - CVE-2026-8014: Inappropriate implementation in Preload.
       Reported by Google.
     - CVE-2026-8015: Inappropriate implementation in Media. Reported by Google
     - CVE-2026-8016: Use after free in WebRTC. Reported by Google.
     - CVE-2026-8017: Side-channel information leakage in Media.
       Reported by Google.
     - CVE-2026-8018: Insufficient policy enforcement in DevTools.
       Reported by Google.
     - CVE-2026-8019: Insufficient policy enforcement in WebApp.
       Reported by Google.
     - CVE-2026-8020: Uninitialized Use in GPU. Reported by Google.
     - CVE-2026-8021: Script injection in UI. Reported by Google.
     - CVE-2026-8022: Inappropriate implementation in MHTML. Reported by Google
   * d/copyright:
     - drop gperf binary that upstream now includes.
     - update for dropping of "khronos" from opengl paths.
   * d/rules:
     - copy gperf binary from /usr/bin into build tree.
     - set webnn_use_litert=false.
   * d/clean:
     - update for harfbuzz-ng to harfbuzz rename.
   * d/patches:
     - upstream/Fix-GL-native-pixmap-import-support-reset-in-GpuInit.patch:
       drop, merged upstream.
     - disable/lint.patch: refresh.
     - trixie/nodejs-set-intersection.patch: refresh for file rename.
     - ungoogled/disable-ai.patch: sync from u-c.
     - trixie/gn-inputs.patch, trixie/gn-inputs2.patch: add patches to
       revert gn "inputs" usage, which isn't supported by our older
       generate-ninja package.
     - llvm-22/ignore-for-ubsan.patch: add another bit to remove the same
       unsupported compiler flag.
     - llvm-19/iota.patch: add build fix for missing std::ranges::iota().
     - upstream/turboshaft.patch: add build fix pulled from (v8) upstream
       for value_or() type ambiguity.
     - trixie/revert-v8-sanitize.patch: add patch to revert v8 gn-related
       changes that cause the build to fail w/ older gn.
     - llvm-19/raw-ref-map-find.patch: add patch to work around older
       clang-19 std::map::find() limitation.
     - rust-1.85/jxl-features.patch: refresh for new version [trixie,
       bookworm].
     - rust-1.85/jxl-simd-avx512.patch: refresh for new version, and also
       drop large portions of this patch that add unsafe{} to macro calls
       (since I already added an unsafe block in the macro definition).
       And mark more functions as unsafe [trixie, bookworm].
     - trixie/adler1.patch: refresh [trixie, bookworm].
     - trixie/rust-is-multiple-of.patch: refresh & move to rust-1.85/
       directory [trixie, bookworm].
     - rust-1.85/file_as_c_str.patch: add patch to work around lack of
       std::panic::file_as_c_str() [trixie, bookworm].
     - rust-1.85/mojo-features.patch: add patch to enable some newer
       rust features in mojom parser [trixie, bookworm].
     - rust-1.85/zip8.patch: add patch to enable some newer rust features
       in zip [trixie, bookworm].
     - bookworm/constexpr.patch: refresh for moved file [bookworm].
     - bookworm/dav1d-drop-hdr.patch: refresh [bookworm].
     - bookworm/eslint.patch: drop, no longer needed [bookworm].
     - ungoogled/remove-navigation-source-param.patch: add patch from u-c
       to drop the "&source=chrome.ob" that shows up when you search for
       something via omnibox.
 .
   [ Timothy Pearson ]
   * d/patches/ppc64le:
     - third_party/0002-regenerate-xnn-buildgn.patch refresh for upstream
       changes
     - third_party/skia-vsx-instructions.patch: refresh for upstream changes
     - fixes/fix-different-data-layouts.patch: refresh for upstream changes
 .
   [ Jianfeng Liu ]
   * d/patches/loongarch64:
     - 0004-loong64-sandbox-sandbox-linux-Update-syscall-helpers.patch: Refresh
       for upstream changes
     - 0024-disable-BROTLI_MODEL-macro-for-some-targets.patch: Drop, merged
       upstream
 .
   [ Daniel Richard G. ]
   * d/patches/llvm-19/clang19.patch: Also drop -Wlifetime-safety-permissive
     flag from v8 build, as clang-19 (and 20) doesn't recognize it.
Checksums-Sha1:
 179047f493e374356da8c9b3f4ccec4f76d7eedb 5515904 chromium-common-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 c62607c006b18cbfab309bb679f29cc1509e7a75 25752688 chromium-common_148.0.7778.96-1~deb12u1_amd64.deb
 9821415dc0b7c6589b28c11ba94481ec3dc37246 35895400 chromium-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 45e826a0a80fd825c97f82a8ba6569ad969d1a88 7580352 chromium-driver_148.0.7778.96-1~deb12u1_amd64.deb
 58808d604171ba16e7a8299a5a072cc401b03f24 29578844 chromium-headless-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 1823464fa1860a5ec94e83e19b0cd471b34f3d54 57644596 chromium-headless-shell_148.0.7778.96-1~deb12u1_amd64.deb
 e3502076173f11fde042c84ee9e80570dc6b682a 19296 chromium-sandbox-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 2de2bf43e4542502911d9542871af6c3dca9ba22 118944 chromium-sandbox_148.0.7778.96-1~deb12u1_amd64.deb
 24552db13cfd790cf83c5b23315ffb521b2c05a6 32427464 chromium-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 b29858ee935bf3a1a277b44700898bee680ed6c8 63129292 chromium-shell_148.0.7778.96-1~deb12u1_amd64.deb
 52065358fab3600564901483bc82147dcc0c952c 30397 chromium_148.0.7778.96-1~deb12u1_amd64-buildd.buildinfo
 e46e77ddc58ec56669c23c40f204d0434769d5d6 75074684 chromium_148.0.7778.96-1~deb12u1_amd64.deb
Checksums-Sha256:
 9fafbd541fee5045ec771b4a1cb71b595c75a29dc65a02653ac35310772dea6c 5515904 chromium-common-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 f0241f38311f547faa045cad664e31f1735323888a4f04fec84767a7fb258833 25752688 chromium-common_148.0.7778.96-1~deb12u1_amd64.deb
 b4d637ca680f47feb0e1f25859d96965dec4ca76f8de6c5d62fff834b8f683c4 35895400 chromium-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 4d65db512f59e6d733a4beceb4d67361880e97ade59de951459b240265df8213 7580352 chromium-driver_148.0.7778.96-1~deb12u1_amd64.deb
 bc2d17aaa8cc1839dba6d7ab9e896c4ad46fc7a45a2b3b49c14aec5335b8a945 29578844 chromium-headless-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 63b520a665e7c26b82e23512d6b0e37187adb4d1c0a4500768dc117df1633e33 57644596 chromium-headless-shell_148.0.7778.96-1~deb12u1_amd64.deb
 4ddaa8894b597713c3d664573506d23f9c15af3c6169689cb64b02c4c2efa861 19296 chromium-sandbox-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 57ed042c5141bca6f11ab18cbcd2353bfb5877c095369013839e23fa82ea1495 118944 chromium-sandbox_148.0.7778.96-1~deb12u1_amd64.deb
 431c395feee064c341179509cecd747e54227b3134e02a47005dc8487f269c8e 32427464 chromium-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 7ee2165d6c0c7d5439ef3067430daf9df9e63f9ef391297be61807326ac889f1 63129292 chromium-shell_148.0.7778.96-1~deb12u1_amd64.deb
 2b164a394ef6927f7f1d7997d8098b3b1b576dc92923384f5fb0ff3490116693 30397 chromium_148.0.7778.96-1~deb12u1_amd64-buildd.buildinfo
 4474d82fdd3b51e96faf09a5bc878481e528805bfb3a198a3b01a56fb8356c35 75074684 chromium_148.0.7778.96-1~deb12u1_amd64.deb
Files:
 df3b40d3f08059ee6dc1e78bd56e363e 5515904 debug optional chromium-common-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 1e8a2630aeb4f5a11aacc89041af3ea9 25752688 web optional chromium-common_148.0.7778.96-1~deb12u1_amd64.deb
 88d388f2a4d386f2e60b2482cd701fe5 35895400 debug optional chromium-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 f8ff5795ff001031d82ebc39437eb70c 7580352 web optional chromium-driver_148.0.7778.96-1~deb12u1_amd64.deb
 6760637a232ce9394c12f3ed2264a718 29578844 debug optional chromium-headless-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 559c428b7e6fd9d9ad048b9ea8e4302a 57644596 web optional chromium-headless-shell_148.0.7778.96-1~deb12u1_amd64.deb
 241e7c4258b52dcb299835364f797380 19296 debug optional chromium-sandbox-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 38657b68e52dbb41ce63cbfffc94cd2b 118944 web optional chromium-sandbox_148.0.7778.96-1~deb12u1_amd64.deb
 73ba9983a4f2d505270295b73b4e60da 32427464 debug optional chromium-shell-dbgsym_148.0.7778.96-1~deb12u1_amd64.deb
 bd56c4d30d1ece05f0197fa9998a8283 63129292 web optional chromium-shell_148.0.7778.96-1~deb12u1_amd64.deb
 f353be7de2db1f65b654fb0ec53446ea 30397 web optional chromium_148.0.7778.96-1~deb12u1_amd64-buildd.buildinfo
 c46bad3bbff70d418734fd8e4c968664 75074684 web optional chromium_148.0.7778.96-1~deb12u1_amd64.deb

-----BEGIN PGP SIGNATURE-----
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=RQxI
-----END PGP SIGNATURE-----
