* CVE-2018-6153: Stack buffer overflow in Skia.
* CVE-2018-6154: Heap buffer overflow in WebGL.
* CVE-2018-6155: Use after free in WebRTC.
* CVE-2018-6156: Heap buffer overflow in WebRTC.
* CVE-2018-6157: Type confusion in WebRTC.
* CVE-2018-6158: Use after free in Blink.
* CVE-2018-6159: Same origin policy bypass in ServiceWorker.
* CVE-2018-6160: URL spoof in Chrome on iOS.
* CVE-2018-6161: Same origin policy bypass in WebAudio.
* CVE-2018-6162: Heap buffer overflow in WebGL.
* CVE-2018-6163: URL spoof in Omnibox.
* CVE-2018-6164: Same origin policy bypass in ServiceWorker.
* CVE-2018-6165: URL spoof in Omnibox.
* CVE-2018-6166: URL spoof in Omnibox.
* CVE-2018-6167: URL spoof in Omnibox.
* CVE-2018-6168: CORS bypass in Blink.
* CVE-2018-6169: Permissions bypass in extension installation.
* CVE-2018-6170: Type confusion in PDFium.
* CVE-2018-6171: Use after free in WebBluetooth.
* CVE-2018-6172: URL spoof in Omnibox.
* CVE-2018-6173: URL spoof in Omnibox.
* CVE-2018-6174: Integer overflow in SwiftShader.
* CVE-2018-6175: URL spoof in Omnibox.
* CVE-2018-6176: Local user privilege escalation in Extensions.
* CVE-2018-6177: Cross origin information leak in Blink.
* CVE-2018-6178: UI spoof in Extensions.
* CVE-2018-6179: Local file information leak in Extensions.
* CVE-2018-6044: Request privilege escalation in Extensions.
* CVE-2018-4117: Cross origin information leak in Blink.
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1145
- Bump to 68.0.3440.75
- Up to chromium-68.0.3440.68
- Up to 68.0.3440.59
- Up to 68.0.3440.42
- Bump 68.0.3440.33
- Up to 68.0.3440.25
- Up to 68.0.3440.17
- Up to 68.0.3438.3
- Up to 68.0.3432.3
- Fix AArch64 build with chromium-crashpad-aarch64-fix.patch
- Up to 68.0.3423.2
- Refresh patch chromium-master-prefs-path.patch
- Fix AArch64 build with chromium-skia-aarch64-buildfix.patch
- Add patch chromium-skia-system-fontconfig.patch bsc#1092272
- Up to 67.0.3393.30
- Up to chromium-67.0.3396.18
- Up to 67.0.3393.4
- Refresh patch exclude_ymp.patch
- Bump to 67.0.3386.1
- Bump to 67.0.3381.1
- Bump to 67.0.3377.1
- Bump to 67.0.3371.0
- Remove no longer needed chromium-gcc7.patch
OBS-URL: https://build.opensuse.org/request/show/625247
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1144
* CVE-2018-6123: Use after free in Blink.
* CVE-2018-6124: Type confusion in Blink.
* CVE-2018-6125: Overly permissive policy in WebUSB.
* CVE-2018-6126: Heap buffer overflow in Skia.
* CVE-2018-6127: Use after free in indexedDB.
* CVE-2018-6128: uXSS in Chrome on iOS.
* CVE-2018-6129: Out of bounds memory access in WebRTC.
* CVE-2018-6130: Out of bounds memory access in WebRTC.
* CVE-2018-6131: Incorrect mutability protection in WebAssembly.
* CVE-2018-6132: Use of uninitialized memory in WebRTC.
* CVE-2018-6133: URL spoof in Omnibox.
* CVE-2018-6134: Referrer Policy bypass in Blink.
* CVE-2018-6135: UI spoofing in Blink.
* CVE-2018-6136: Out of bounds memory access in V8.
* CVE-2018-6137: Leak of visited status of page in Blink.
* CVE-2018-6138: Overly permissive policy in Extensions.
* CVE-2018-6139: Restrictions bypass in the debugger extension API.
* CVE-2018-6140: Restrictions bypass in the debugger extension API.
* CVE-2018-6141: Heap buffer overflow in Skia.
* CVE-2018-6142: Out of bounds memory access in V8.
* CVE-2018-6143: Out of bounds memory access in V8.
* CVE-2018-6144: Out of bounds memory access in PDFium.
* CVE-2018-6145: Incorrect escaping of MathML in Blink.
* CVE-2018-6147: Password fields not taking advantage of OS protections in Views.
- Add patches to build on aarch and remove obsolete one:
* chromium-crashpad-aarch64-fix.patch
* chromium-skia-aarch64-buildfix.patch
* chromium-65.0.3325.162-skia-aarch64-buildfix.patch
* chromium-skia-neon.patch
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1133
- Up to 67.0.3396.62
- Up to chromium-67.0.3396.56
- Fix SLE12 builds again
- Bump to 67.0.3396.48
- Fix AArch64 build with chromium-crashpad-aarch64-fix.patch
- Up to 67.0.3393.40
- Extend patch chromium-non-void-return.patch
- Fix AArch64 build with chromium-skia-aarch64-buildfix.patch
- Add patch chromium-skia-system-fontconfig.patch bsc#1092272
- Up to 67.0.3393.30
- Up to chromium-67.0.3396.18
- Up to 67.0.3393.4
- Refresh patch exclude_ymp.patch
- Bump to 67.0.3386.1
- Bump to 67.0.3381.1
- Bump to 67.0.3377.1
- Bump to 67.0.3371.0
- Remove no longer needed chromium-gcc7.patch
- Rebase fix_building_widevinecdm_with_chromium.patch to allow
widevine builds
- Bump to 66.0.3359.33
- Version bump to 66.0.3359.26
OBS-URL: https://build.opensuse.org/request/show/613035
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1132
* CVE-2018-6085: Use after free in Disk Cache
* CVE-2018-6086: Use after free in Disk Cache
* CVE-2018-6087: Use after free in WebAssembly
* CVE-2018-6088: Use after free in PDFium
* CVE-2018-6089: Same origin policy bypass in Service Worker
* CVE-2018-6090: Heap buffer overflow in Skia
* CVE-2018-6091: Incorrect handling of plug-ins by Service Worker
* CVE-2018-6092: Integer overflow in WebAssembly
* CVE-2018-6093: Same origin bypass in Service Worker
* CVE-2018-6094: Exploit hardening regression in Oilpan
* CVE-2018-6095: Lack of meaningful user interaction requirement before file upload
* CVE-2018-6096: Fullscreen UI spoof
* CVE-2018-6097: Fullscreen UI spoof
* CVE-2018-6098: URL spoof in Omnibox
* CVE-2018-6099: CORS bypass in ServiceWorker
* CVE-2018-6100: URL spoof in Omnibox
* CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools
* CVE-2018-6102: URL spoof in Omnibox
* CVE-2018-6103: UI spoof in Permissions
* CVE-2018-6104: URL spoof in Omnibox
* CVE-2018-6105: URL spoof in Omnibox
* CVE-2018-6106: Incorrect handling of promises in V8
* CVE-2018-6107: URL spoof in Omnibox
* CVE-2018-6108: URL spoof in Omnibox
* CVE-2018-6109: Incorrect handling of files by FileAPI
* CVE-2018-6110: Incorrect handling of plaintext files via file://
* CVE-2018-6111: Heap-use-after-free in DevTools
* CVE-2018-6112: Incorrect URL handling in DevTools
* CVE-2018-6113: URL spoof in Navigation
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1115
- Up to 66.0.3359.81
- Bump to 66.0.3359.66
- Update chromium-gcc7.patch to include more quirks
- Bump to 66.0.3359.45
- Bump to 66.0.3359.33
- Version bump to 66.0.3359.26
- Bump the requirement for the clang version
- Conditionalize harfbuzz switch
- Update to 66.0.3359.22
- Apply patches using %autopatch
- Add patch to build with gcc7 properly chromium-gcc7.patch
- Drop patch chromium-sandbox-pie.patch as we have pie default now
- Add patch to build with leap variant of drm chromium-drm.patch
- Add patch to build ffmpeg from system chromium-ffmpeg.patch
- Up to 66.0.3355.0
- Disable clang by default again
- Up to 66.0.3350.0
- Drop patch fix_network_api_crash.patch
- Bump to 66.0.3343.3
- Bump to 65.0.3325.51
- Disable gconf support
- Bump to 65.0.3325.31
- Update to 65.0.3325.18
- Try to have automatic ozone platform detection
OBS-URL: https://build.opensuse.org/request/show/597716
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1114
* High CVE-2017-11215: Use after free in Flash.
* High CVE-2017-11225: Use after free in Flash.
* High CVE-2018-6060: Use after free in Blink.
* High CVE-2018-6061: Race condition in V8.
* High CVE-2018-6062: Heap buffer overflow in Skia.
* High CVE-2018-6057: Incorrect permissions on shared memory.
* High CVE-2018-6063: Incorrect permissions on shared memory.
* High CVE-2018-6064: Type confusion in V8.
* High CVE-2018-6065: Integer overflow in V8.
* Medium CVE-2018-6066: Same Origin Bypass via canvas.
* Medium CVE-2018-6067: Buffer overflow in Skia.
* Medium CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab.
* Medium CVE-2018-6069: Stack buffer overflow in Skia.
* Medium CVE-2018-6070: CSP bypass through extensions.
* Medium CVE-2018-6071: Heap bufffer overflow in Skia.
* Medium CVE-2018-6072: Integer overflow in PDFium.
* Medium CVE-2018-6073: Heap bufffer overflow in WebGL.
* Medium CVE-2018-6074: Mark-of-the-Web bypass.
* Medium CVE-2018-6075: Overly permissive cross origin downloads.
* Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink.
* Medium CVE-2018-6077: Timing attack using SVG filters.
* Medium CVE-2018-6078: URL Spoof in OmniBox.
* Medium CVE-2018-6079: Information disclosure via texture data in WebGL.
* Medium CVE-2018-6080: Information disclosure in IPC call.
* Low CVE-2018-6081: XSS in interstitials.
* Low CVE-2018-6082: Circumvention of port blocking.
* Low CVE-2018-6083: Incorrect processing of AppManifests.
- Add new patches:
* chromium-compiler.patch
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1097
- Bump to 65.0.3325.146
- Add another codepoint to chromium-non-void-return.patch
- Bump to 65.0.3325.106
- Add patch for mojo build with gcc mojo.patch
- Keep ozone still disabled
- Build with clang now
- Update fix-gn-bootstrap.diff
- Add patch chromium-glibc-2.27.patch
- Add patch chromium-compiler.patch
- Bump to 65.0.3325.73
- Bump to 65.0.3325.51
- Disable gconf support
- Bump to 65.0.3325.31
- Update to 65.0.3325.18
- Try to have automatic ozone platform detection
- Bump to 65.0.3322.3
- Bump to 65.0.3311.3
- Drop chromium-63.0.3289.84-fix-ft-hb-unbundle.patch
- add chromium-63.0.3289.84-fix-ft-hb-unbundle.patch to make sure
we use system freetype/harfbuzz
- Make sure to use system freetype too
OBS-URL: https://build.opensuse.org/request/show/584217
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1096
* High CVE-2018-6031: Use after free in PDFium. Reported by Anonymous on 2017-11-01
* High CVE-2018-6032: Same origin bypass in Shared Worker. Reported by Jun Kokatsu (@shhnjk) on 2017-11-20
* High CVE-2018-6033: Race when opening downloaded files. Reported by Juho Nurminen on 2017-12-09
* Medium CVE-2018-6034: Integer overflow in Blink. Reported by Tobias Klein (www.trapkit.de) on 2017-11-12
* Medium CVE-2018-6035: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23
* Medium CVE-2018-6036: Integer underflow in WebAssembly. Reported by The UK's National Cyber Security Centre (NCSC) on 2017-11-30
* Medium CVE-2018-6037: Insufficient user gesture requirements in autofill. Reported by Paul Stone of Context Information Security on 2017-08-09
* Medium CVE-2018-6038: Heap buffer overflow in WebGL. Reported by cloudfuzzer on 2017-10-12
* Medium CVE-2018-6039: XSS in DevTools. Reported by Juho Nurminen on 2017-10-17
* Medium CVE-2018-6040: Content security policy bypass. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-26
* Medium CVE-2018-6041: URL spoof in Navigation. Reported by Luan Herrera on 2017-08-29
* Medium CVE-2018-6042: URL spoof in OmniBox. Reported by Khalil Zhani on 2017-10-12
* Medium CVE-2018-6043: Insufficient escaping with external URL handlers. Reported by 0x09AL on 2017-11-16
* Medium CVE-2018-6045: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-23
* Medium CVE-2018-6046: Insufficient isolation of devtools from extensions. Reported by Rob Wu on 2017-12-31
* Medium CVE-2018-6047: Cross origin URL leak in WebGL. Reported by Masato Kinugawa on 2018-01-08
* Low CVE-2018-6048: Referrer policy bypass in Blink. Reported by Jun Kokatsu (@shhnjk) on 2017-09-08
* Low CVE-2017-15420: URL spoofing in Omnibox. Reported by Drew Springall (@_aaspring_) on 2017-10-05
* Low CVE-2018-6049: UI spoof in Permissions. Reported by WenXu Wu of Tencent's Xuanwu Lab on 2017-10-13
* Low CVE-2018-6050: URL spoof in OmniBox. Reported by Jonathan Kew on 2017-10-15
* Low CVE-2018-6051: Referrer leak in XSS Auditor. Reported by Antonio Sanso (@asanso) on 2014-12-11
* Low CVE-2018-6052: Incomplete no-referrer policy implementation. Reported by Tanner Emek on 2016-05-28
* Low CVE-2018-6053: Leak of page thumbnails in New Tab Page. Reported by Asset Kabdenov on 2017-08-23
* Low CVE-2018-6054: Use after free in WebUI. Reported by Rob Wu on 2017-12-24
- Add patches:
* chromium-angle.patch
* chromium-memcpy.patch
- Drop patch:
* chromium-gcc.patch
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1079
- Up to 64.0.3282.119
- Up to 64.0.3282.85
- Up to 64.0.3282.71
- Add patch to build with gcc chromium-angle.patch
- Bumpy to 64.0.3282.39
- Explicitely describe what ozone parts we want
- Bump to 64.0.3282.24
- Enable system icu again
- Tweak the deps to match current setup
- Add patch chromium-memcpy.patch
- Minimize desktop name to not take so much space
- Bumpyty to 64.0.3282.14
- Bumpy to 64.0.3278.0
- Drop chromium-64.0.3253.3-gpu_lists_version.h.patch
- Drop chromium-gcc.patch
- Up to 64.0.3269.3
- Add patch chromium-non-void-return.patch
- Add patch chromium-64.0.3253.3-gpu_lists_version.h.patch
- Bump to 64.0.3253.3
OBS-URL: https://build.opensuse.org/request/show/569452
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1078