chromium-131.0.6778.108-bp155.2.147.1<>,uSgZYI%z a幰eq)W.=Uea5:|t^?V-xmR{ӓzP<g"RƊNP5A@pX'v're>p<{~^\BegPߙorKNzO+'6G#?#|d  ( Mhlx| uu u u u Au uu"-u$v$u&x(z*z8z888(8889A4:B_ F?GXuH,uIuXxYZt [ \4u] u^ "bncdefluuvwuxuyz####*#,#0#6#xCchromium131.0.6778.108bp155.2.147.1Google's open source browser projectChromium is the open-source project behind Google Chrome. We invite you to join us in our effort to help build a safer, faster, and more stable way for all Internet users to experience the web, and to create a powerful platform for developing a new generation of web applications.gZYi01-armsrv2 SUSE Linux Enterprise 15openSUSEBSD-3-Clause AND LGPL-2.1-or-laterhttp://bugs.opensuse.orgUnspecifiedhttps://www.chromium.org/linuxaarch64  cx Epb`Hk X K?r~ h $ 7Z K Y{ PC I = I 1E fG ^x Gt 3K u 4 -)**U1{ / A7 q  ~TJ;9 - N VD !A)%6 | A큤AAAmAA큤큤A큤AAA큤AAA큤AA큤AA큤AA큤AA큤AA큤AA큤AA큤A큤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-browser../lib64/chromium/chrome-wrapper../browser-pluginschromium-browser.1.gzrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootchromium-131.0.6778.108-bp155.2.147.1.src.rpmapplication()application(chromium-browser.desktop)chromiumchromium(aarch-64)chromium-based-browserchromium-browserchromium-suid-helperconfig(chromium)metainfo()metainfo(chromium-browser.appdata.xml)mimehandler(application/pdf)mimehandler(application/rdf+xml)mimehandler(application/rss+xml)mimehandler(application/xhtml+xml)mimehandler(application/xhtml_xml)mimehandler(application/xml)mimehandler(image/gif)mimehandler(image/jpeg)mimehandler(image/png)mimehandler(image/webp)mimehandler(text/html)mimehandler(text/xml)mimehandler(x-scheme-handler/http)mimehandler(x-scheme-handler/https)web_browser@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@    /bin/bashconfig(chromium)ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libFLAC.so.8()(64bit)libQt5Core.so.5()(64bit)libQt5Core.so.5(Qt_5)(64bit)libQt5Gui.so.5()(64bit)libQt5Gui.so.5(Qt_5)(64bit)libQt5Widgets.so.5()(64bit)libQt5Widgets.so.5(Qt_5)(64bit)libX11.so.6()(64bit)libXcomposite.so.1()(64bit)libXdamage.so.1()(64bit)libXext.so.6()(64bit)libXfixes.so.3()(64bit)libXrandr.so.2()(64bit)libasound.so.2()(64bit)libasound.so.2(ALSA_0.9)(64bit)libasound.so.2(ALSA_0.9.0rc4)(64bit)libatk-1.0.so.0()(64bit)libatk-bridge-2.0.so.0()(64bit)libatspi.so.0()(64bit)libavcodec.so.58.134()(64bit)libavcodec.so.58.134(LIBAVCODEC_58)(64bit)libavformat.so.58.76()(64bit)libavformat.so.58.76(LIBAVFORMAT_58)(64bit)libavutil.so.56.70()(64bit)libavutil.so.56.70(LIBAVUTIL_56)(64bit)libc++.so.1()(64bit)libc++abi.so.1()(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.18)(64bit)libc.so.6(GLIBC_2.25)(64bit)libc.so.6(GLIBC_2.27)(64bit)libc.so.6(GLIBC_2.28)(64bit)libc.so.6(GLIBC_2.29)(64bit)libcairo.so.2()(64bit)libcups.so.2()(64bit)libdbus-1.so.3()(64bit)libdbus-1.so.3(LIBDBUS_1_3)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.17)(64bit)libdrm.so.2()(64bit)libevent-2.1.so.6()(64bit)libexpat.so.1()(64bit)libffi.so.7()(64bit)libffi.so.7(LIBFFI_BASE_7.0)(64bit)libfontconfig.so.1()(64bit)libgbm.so.1()(64bit)libgcc_s.so.1()(64bit)libgcc_s.so.1(GCC_3.0)(64bit)libgcc_s.so.1(GCC_3.3)(64bit)libgcc_s.so.1(GCC_4.2.0)(64bit)libgcc_s.so.1(GLIBC_2.0)(64bit)libgio-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libjpeg.so.8()(64bit)libjpeg.so.8(LIBJPEG_8.0)(64bit)libm.so.6()(64bit)libm.so.6(GLIBC_2.17)(64bit)libm.so.6(GLIBC_2.27)(64bit)libm.so.6(GLIBC_2.29)(64bit)libnspr4.so()(64bit)libnss3.so()(64bit)libnss3.so(NSS_3.11)(64bit)libnss3.so(NSS_3.12)(64bit)libnss3.so(NSS_3.12.1)(64bit)libnss3.so(NSS_3.12.4)(64bit)libnss3.so(NSS_3.2)(64bit)libnss3.so(NSS_3.22)(64bit)libnss3.so(NSS_3.3)(64bit)libnss3.so(NSS_3.30)(64bit)libnss3.so(NSS_3.31)(64bit)libnss3.so(NSS_3.4)(64bit)libnss3.so(NSS_3.5)(64bit)libnss3.so(NSS_3.6)(64bit)libnss3.so(NSS_3.7)(64bit)libnss3.so(NSS_3.9.2)(64bit)libnssutil3.so()(64bit)libnssutil3.so(NSSUTIL_3.12.3)(64bit)libopus.so.0()(64bit)libpango-1.0.so.0()(64bit)libpipewire-0.3.so.0()(64bit)libpng16.so.16()(64bit)libpng16.so.16(PNG16_0)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libpthread.so.0(GLIBC_2.30)(64bit)libpulse.so.0()(64bit)libpulse.so.0(PULSE_0)(64bit)libsmime3.so()(64bit)libsmime3.so(NSS_3.10)(64bit)libsmime3.so(NSS_3.2)(64bit)libudev.so.1()(64bit)libudev.so.1(LIBUDEV_183)(64bit)libxcb.so.1()(64bit)libxkbcommon.so.0()(64bit)libxkbcommon.so.0(V_0.5.0)(64bit)libxml2.so.2()(64bit)libxml2.so.2(LIBXML2_2.4.30)(64bit)libxml2.so.2(LIBXML2_2.5.0)(64bit)libxml2.so.2(LIBXML2_2.6.0)(64bit)libxml2.so.2(LIBXML2_2.6.15)(64bit)libxml2.so.2(LIBXML2_2.6.5)(64bit)libxml2.so.2(LIBXML2_2.6.6)(64bit)libxslt.so.1()(64bit)libxslt.so.1(LIBXML2_1.0.11)(64bit)libxslt.so.1(LIBXML2_1.0.13)(64bit)libxslt.so.1(LIBXML2_1.0.22)(64bit)libxslt.so.1(LIBXML2_1.0.24)(64bit)libxslt.so.1(LIBXML2_1.0.30)(64bit)libxslt.so.1(LIBXML2_1.1.18)(64bit)libxslt.so.1(LIBXML2_1.1.9)(64bit)permissionsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)xdg-utils131.0.6778.108-bp155.2.147.13.0.4-14.6.0-14.0-15.2-1chromium-browser4.14.3gPD@g=@g,g+Z@g"g|gg dg df5f@f@ff@f@fbff@ffxf@f&@f@fifYfP@fLfE@fCR@f> @f4f3@f2.f+@ff@e,e@eeee@ee{@eg'eTeN@e7e/e&@e%@c8+c!@c@ccob)bbL@bb@bmbbb2@b@bTb@b@b{@brjbaG@bY^@bUibRbL/@bDF@bBb?@b8hb1@b!@b aa@aNaq@a͟@a͟@aMaɪaŶ@aa@aaaa~@auJajaa@aa@a`2aY@aEaA@a+vaaa $@a`@`@`@`̊``@`@``Z`q`@`N@``v@`hX`OL@`J@`B@`-@`*b@``` `@__<_$_;_^@_#_@_F@_t@__@_@_@_@_k8_i@_`_\@_X_Wr@_N7_H_G@_G@_?@_>e_3_16_16_'@__A@^@^^@@^^^^^^^W@^^b^^^^@^@^ϧ^ϧ^V@^˳@^Ǿ^^^^U@^l@^^1^@^^^^^<@^}^x^s^^l@^`^^F^U @^J@^E:@^C^:@^"@^@^ ]f@]@]*]҇]X]µ]]]@]{@]]@]@]@]n]m]@]y@]y@]z3@]z3@]nU]Z@]QT]L]D%]@1@]@1@]/ ]-@]G@]G@] #]@\\@\Q\"\E@\s@\8\C@\\\|\\}@\zp@\s\mA@\ac\ac\Q\,\@\I\ `\ @\ @[H[@[ݍ[Ѱ@[ͻ[@[@[$@[[[[[[[[j@[a[Xf@[Xf@[Xf@[Xf@[D[#@[!@[@[5@[@[ [ L@Z@ZZZK@ZZ3@Z@Za@ZI@ZZZZw@Z%ZSZ$ZtRZtRZo Zo Zk@ZiZiZN@Z3@Z)-@ZfZ ,@Z@YZ@YYY@Y@Y|YY@Y@YzYY@Y@Y@Yx@Yu@YS@YMYC@Y9<@Y6@Y5GYY X:@X@X@X @XrX~@X•@XBXe@Xe@XpX@XX|@XXZnXZnXOXJXEVXBX'@X lX@X @Ww@WSW W0@Wڍ@W;W֘WW@W@WW@W@WW@W@W@Wm Wk@Wc@WV@WPWF@W5W#LW@W@W@VVV@V޾VxVVVVwVVV@V@VVVV$@VVv@Vn@Vii@VbV^@VC-V*!@V$@VCV@VBUYU@UU@Uz@U4@UK@UUJ@Ua@UzUeU\w@U@U>$U.RU/@U ]@UTT\@T@T!T~TOTT@T7TT5T{TuTl@TeTO@T>aro@suse.dero@suse.dero@suse.dero@suse.dero@suse.dero@suse.deAndreas Stieger Andreas Stieger Andreas Stieger ro@suse.dero@suse.dero@suse.dero@suse.dero@suse.dero@suse.deAndreas Stieger Andreas Stieger ro@suse.dero@suse.dero@suse.deAndreas Stieger Callum Farmer Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger ro@suse.deAndreas Stieger Andreas Stieger ro@suse.deAndreas Stieger Callum Farmer ro@suse.dero@suse.deAndreas Stieger Callum Farmer Andreas Stieger ro@suse.deCallum Farmer Callum Farmer Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Guillaume GARDET Andreas Stieger Martin Liška Callum Farmer Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Paolo Stivanin Andreas Schwab Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Andreas Stieger Andreas Stieger Callum Farmer Callum Farmer Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Callum Farmer Andreas Schwab Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Martin Liška Callum Farmer Callum Farmer Callum Farmer Callum Farmer Andreas Stieger Callum Farmer Callum Farmer Steve Kowalik Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Andreas Stieger Callum Farmer Andreas Stieger Andreas Stieger Andreas Stieger Andreas Stieger Callum Farmer Andreas Stieger Marcus Meissner Andreas Stieger Callum Farmer Marcus Meissner Andreas Stieger Andreas Stieger Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Callum Farmer Marcus Meissner Marcus Meissner Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Andreas Stieger Tomáš Chvátal Andreas Stieger Tomáš Chvátal Tomáš Chvátal Atri Bhattacharya Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Fabian Vogt Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Guillaume GARDET Tomáš Chvátal Tomáš Chvátal Ismail Dönmez Andreas Stieger Martin Liška Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Martin Liška Stasiek Michalski Antonio Larrosa Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Andreas Stieger Tomáš Chvátal Stefan Brüns Andreas Stieger Tomáš Chvátal Tomáš Chvátal Guillaume GARDET Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Stasiek Michalski Tomáš Chvátal Jan Ritzerfeld Andreas Stieger Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Jan Ritzerfeld Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Martin Liška Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Andreas Stieger Guillaume GARDET Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Simon Lees Tomáš Chvátal Tomáš Chvátal Guillaume GARDET Tomáš Chvátal Guillaume GARDET Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal Yunhe Guo Tomáš Chvátal Tomáš Chvátal Tomáš Chvátal astieger@suse.comTomáš Chvátal Tomáš Chvátal Tomáš Chvátal astieger@suse.comtchvatal@suse.comtchvatal@suse.comTomáš Chvátal Tomáš Chvátal tchvatal@suse.comtchvatal@suse.comguillaume.gardet@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comsecurity@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comguillaume.gardet@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comdimstar@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comidonmez@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comidonmez@suse.comtchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.nettchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.netqvoheagbfovvhubzdxfx@posteo.nettchvatal@suse.comqvoheagbfovvhubzdxfx@posteo.netastieger@suse.comtchvatal@suse.comidonmez@suse.comastieger@suse.comastieger@suse.comtchvatal@suse.comastieger@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comdimstar@opensuse.orgtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comtchvatal@suse.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comNick_Levinson@yahoo.comtittiatcoke@gmail.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comastieger@suse.comastieger@suse.comjslaby@suse.comtittiatcoke@gmail.comastieger@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtchvatal@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comstefan.bruens@rwth-aachen.destefan.bruens@rwth-aachen.deastieger@suse.comjimmy@boombatower.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.commeissner@suse.commeissner@suse.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comLed tittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.comtittiatcoke@gmail.com- Chromium 131.0.6778.108 (stable released 2024-12-04) (boo#1234118) * CVE-2024-12053: Type Confusion in V8 - update patches: chromium-127-constexpr.patch- Chromium 131.0.6778.85 (stable released 2024-11-19) (boo#1233534) * CVE-2024-11395: Type Confusion in V8- Chromium 131.0.6778.69 (stable released 2024-11-12) (boo#1233311) * CVE-2024-11110: Inappropriate implementation in Blink. * CVE-2024-11111: Inappropriate implementation in Autofill. * CVE-2024-11112: Use after free in Media. (n/a for linux) * CVE-2024-11113: Use after free in Accessibility. * CVE-2024-11114: Inappropriate implementation in Views. (n/a for linux) * CVE-2024-11115: Insufficient policy enforcement in Navigation. (n/a for linux) * CVE-2024-11116: Inappropriate implementation in Paint. * CVE-2024-11117: Inappropriate implementation in FileSystem. - dropped patches: * chromium-130-missing-includes.patch (upstream) * chromium-125-lp155-typename.patch (not required with llvm) - modified patches: * chromium-127-bindgen.patch (drop all allowlist changes) * chromium-127-constexpr.patch (update from debian patch) - added patches: * chromium-131-unbundle-enable-freetype.patch from git, missing in 131 release * chromium-131-clang-stack-protector.patch (partial revert of upstream commit c3dadb02f611a360fb40fd8844ed3c1ef1e7834e) - drop from keeplibs: (deleted upstream) third_party/devtools-frontend/src/front_end/third_party/lodash-isequal - add to keeplibs: third_party/tflite/src/third_party/xla/xla/tsl (drop subdirs) third_party/ink- Chromium 130.0.6723.116 (boo#1232843) * CVE-2024-10826: Use after free in Family Experiences * CVE-2024-10827: Use after free in Serial- Chromium 130.0.6723.91 (boo#1232566) * CVE-2024-10487: Out of bounds write in Dawn * CVE-2024-10488: Use after free in WebRTC- change BR for rust to require version 1.81 (1.82 uses a newer llvm)- Chromium 130.0.6723.69 (boo#1232060) * CVE-2024-10229: Inappropriate implementation in Extensions * CVE-2024-10230: Type Confusion in V8 * CVE-2024-10231: Type Confusion in V8- Chromium 130.0.6723.58 (boo#1231694) * CVE-2024-9954: Use after free in AI * CVE-2024-9955: Use after free in Web Authentication * CVE-2024-9956: Inappropriate implementation in Web Authentication * CVE-2024-9957: Use after free in UI * CVE-2024-9958: Inappropriate implementation in PictureInPicture * CVE-2024-9959: Use after free in DevTools * CVE-2024-9960: Use after free in Dawn * CVE-2024-9961: Use after free in Parcel Tracking * CVE-2024-9962: Inappropriate implementation in Permissions * CVE-2024-9963: Insufficient data validation in Downloads * CVE-2024-9964: Inappropriate implementation in Payments * CVE-2024-9965: Insufficient data validation in DevTools * CVE-2024-9966: Inappropriate implementation in Navigations - modified patches: * exclude_ymp.patch update context * chromium-125-compiler.patch update context * chromium-125-lp155-typename.patch drop hunks for rewritten proto_fetcher.h * chromium-127-bindgen.patch update context - added patches: * chromium-130-missing-includes.patch include optional, stack * chromium-130-no-hardware_destructive_interference_size.patch workaround for older libcpp - drop from keeplibs: courgette/third_party dropped upstream - add to keepllibs: third_party/fast_float needed by v8/src/numbers/conversion.cc- Chromium 129.0.6668.100 (boo#1231420) * CVE-2024-9602: Type Confusion in V8 * CVE-2024-9603: Type Confusion in V8- Chromium 129.0.6668.89 (stable released 2024-09-24) (boo#1231232) * CVE-2024-7025: Integer overflow in Layout * CVE-2024-9369: Insufficient data validation in Mojo * CVE-2024-9370: Inappropriate implementation in V8- Chromium 129.0.6668.70 (stable released 2024-09-24) (boo#1230964) * CVE-2024-9120: Use after free in Dawn * CVE-2024-9121: Inappropriate implementation in V8 * CVE-2024-9122: Type Confusion in V8 * CVE-2024-9123: Integer overflow in Skia- bump BR for nodejs to minimal 20.0 - dropped patches: * chromium-disable-GlobalMediaControlsCastStartStop.patch it was applied at the wrong place and the crash is gone- Chromium 129.0.6668.58 (stable released 2024-09-17) (boo#1230678) * CVE-2024-8904: Type Confusion in V8 * CVE-2024-8905: Inappropriate implementation in V8 * CVE-2024-8906: Incorrect security UI in Downloads * CVE-2024-8907: Insufficient data validation in Omnibox * CVE-2024-8908: Inappropriate implementation in Autofill * CVE-2024-8909: Inappropriate implementation in UI - modified patches: * chromium-prop-codecs.patch update context - add to keeplibs: third_party/rapidhash - drop from keeplibs: third_party/libudev dropped upstream third_party/catapult/third_party/html5lib-python dropped upstream - add patches: chromium-129-revert-AVFMT_FLAG_NOH264PARSE.patch (not in our ffmpeg yet)- Chromium 128.0.6613.137 (released 2024-09-10) (boo#1230391) * CVE-2024-8636: Heap buffer overflow in Skia * CVE-2024-8637: Use after free in Media Router * CVE-2024-8638: Type Confusion in V8 * CVE-2024-8639: Use after free in Autofill- Chromium 128.0.6613.119 (released 2024-09-02) (boo#1230108) * CVE-2024-8362: Use after free in WebAudio * CVE-2024-7970: Out of bounds write in V8- Chromium 128.0.6613.113 (boo#1229897) * CVE-2024-7969: Type Confusion in V8 * CVE-2024-8193: Heap buffer overflow in Skia * CVE-2024-8194: Type Confusion in V8 * CVE-2024-8198: Heap buffer overflow in Skia- Chromium 128.0.6613.84 (boo#1229591) * CVE-2024-7964: Use after free in Passwords * CVE-2024-7965: Inappropriate implementation in V8 * CVE-2024-7966: Out of bounds memory access in Skia * CVE-2024-7967: Heap buffer overflow in Fonts * CVE-2024-7968: Use after free in Autofill * CVE-2024-7969: Type Confusion in V8 * CVE-2024-7971: Type confusion in V8 * CVE-2024-7972: Inappropriate implementation in V8 * CVE-2024-7973: Heap buffer overflow in PDFium * CVE-2024-7974: Insufficient data validation in V8 API * CVE-2024-7975: Inappropriate implementation in Permissions * CVE-2024-7976: Inappropriate implementation in FedCM * CVE-2024-7977: Insufficient data validation in Installer * CVE-2024-7978: Insufficient policy enforcement in Data Transfer * CVE-2024-7979: Insufficient data validation in Installer * CVE-2024-7980: Insufficient data validation in Installer * CVE-2024-7981: Inappropriate implementation in Views * CVE-2024-8033: Inappropriate implementation in WebApp Installs * CVE-2024-8034: Inappropriate implementation in Custom Tabs * CVE-2024-8035: Inappropriate implementation in Extensions * Various fixes from internal audits, fuzzing and other initiatives- Chromium 128.0.6613.36 (boo#1229426) - modified patches: * chromium-norar.patch drop most hunks, upstream has a config for this now * gcc-enable-lto.patch update context * chromium-125-compiler.patch update context * chromium-127-constexpr.patch update context - drop patches: (should be obsolete with llvm>17 and libc++) chromium-120-emplace.patch chromium-125-emplace-struct.patch - drop patches: (upstream) * chromium-121-nullptr_t-without-namespace-std.patch * chromium-123-stats-collector.patch * chromium-127-paint-layer-header.patch * chromium-127-ninja-1.21.1-deps-part0.patch * chromium-127-ninja-1.21.1-deps-part1.patch * chromium-127-ninja-1.21.1-deps-part2.patch * chromium-127-ninja-1.21.1-deps-part3.patch - disable rpmlint only for factory/tw where it is broken because of the large archive size of the source here - keeplibs add third_party/devtools-frontend/src/front_end/third_party/ puppeteer/package/lib/esm/third_party/parsel-js third_party/tflite/src/third_party/xla/xla/tsl/framework - buildflags add safe_browsing_use_unrar=false- Chromium 127.0.6533.119 (boo#1228941) * CVE-2024-7532: Out of bounds memory access in ANGLE * CVE-2024-7533: Use after free in Sharing * CVE-2024-7550: Type Confusion in V8 * CVE-2024-7534: Heap buffer overflow in Layout * CVE-2024-7535: Inappropriate implementation in V8 * CVE-2024-7536: Use after free in WebAudio- Chromium 127.0.6533.88 (boo#1228628, boo#1228940, boo#1228942) * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader * CVE-2024-6991: Use after free in Dawn * CVE-2024-6992: Out of bounds memory access in ANGLE * CVE-2024-6993: Inappropriate implementation in Canvas * CVE-2024-6994: Heap buffer overflow in Layout * CVE-2024-6995: Inappropriate implementation in Fullscreen * CVE-2024-6996: Race in Frames * CVE-2024-6997: Use after free in Tabs * CVE-2024-6998: Use after free in User Education * CVE-2024-6999: Inappropriate implementation in FedCM * CVE-2024-7000: Use after free in CSS. Reported by Anonymous * CVE-2024-7001: Inappropriate implementation in HTML * CVE-2024-7003: Inappropriate implementation in FedCM * CVE-2024-7004: Insufficient validation of untrusted input in Safe Browsing * CVE-2024-7005: Insufficient validation of untrusted input in Safe Browsing * CVE-2024-6990: Uninitialized Use in Dawn * CVE-2024-7255: Out of bounds read in WebTransport * CVE-2024-7256: Insufficient data validation in Dawn - drop patches: * chromium-115-compiler-SkColor4f.patch only for llvm < 16 * chromium-117-system-zstd.patch upstreamed * chromium-122-workaround_clang_bug-structured_binding.patch * chromium-125-tabstrip-include.patch upstreamed * chromium-126-missing-header-files.patch * chromium-126-RealTimeReportingBindings-missing-decl.patch upstreamed * chromium-126-no_matching_constructor.patch * chromium-126-no-format.patch upstreamed - switch from libstdc++ to libc++ - drop patches obsolete when using libc++ * chromium-126-debian-bad-font-gc00000.patch * chromium-126-debian-bad-font-gc2.patch * chromium-126-debian-bad-font-gc1.patch * chromium-126-debian-bad-font-gc00.patch * chromium-126-debian-bad-font-gc000.patch * chromium-126-debian-bad-font-gc11.patch * chromium-126-debian-bad-font-gc0.patch * chromium-126-debian-bad-font-gc0000.patch * chromium-126-debian-bad-font-gc3.patch - modify patches: * chromium-125-lp155-typename.patch - drop hunk in model_execution_util.h - drop hunk in model_quality_log_entry.h - dropping from keeplibs: (does not exist) base/third_party/valgrind third_party/maldoca third_party/maldoca/src/third_party - requires updated gn to build (newer than Feb 14 2024) - add patches: * chromium-127-bindgen.patch (from debian/patches/fixes)) * chromium-127-rust-clanglib.patch (just first hunk from fedora) * chromium-127-clang17-traitors.patch workaround for clang < 18 from debiana (only used on 15.6) * chromium-127-constexpr.patch (from debian/patches/bookworm) * chromium-127-paint-layer-header.patch (from debian/patches/upstream) * chromium-127-ninja-1.21.1-deps-part0.patch (from fedora) * chromium-127-ninja-1.21.1-deps-part1.patch (from fedora) * chromium-127-ninja-1.21.1-deps-part2.patch (from fedora) * chromium-127-ninja-1.21.1-deps-part3.patch (from fedora) - buildrequire rust-bindgen to get proper binaries per arch - use qt5 for factory as well, qt6 fails with: ld.lld: error: undefined symbol: QByteArray::toStdString() const referenced by qt_shim.cc obj/ui/qt/qt6_shim/libqt6_shim.so.lto.qt_shim.o:(qt::QtShim::GetFontDescription() const) - drop patches: * chromium-125-debian-bad-font-gc11.patch * chromium-125-debian-bad-font-gc0000.patch * chromium-125-debian-bad-font-gc00.patch * chromium-125-debian-bad-font-gc0.patch * chromium-125-debian-bad-font-gc000.patch * chromium-125-debian-bad-font-gc1.patch- Chromium 126.0.6478.182 (boo#1227979) * CVE-2024-6772: Inappropriate implementation in V8 * CVE-2024-6773: Type Confusion in V8 * CVE-2024-6774: Use after free in Screen Capture * CVE-2024-6775: Use after free in Media Stream * CVE-2024-6776: Use after free in Audio * CVE-2024-6777: Use after free in Navigation * CVE-2024-6778: Race in DevTools * CVE-2024-6779: Out of bounds memory access in V8- Finalize 126 - Removed patches: * chromium-125-debian-bad-font-gc2.patch * chromium-125-debian-bad-font-gc3.patch - Added patches: * chromium-126-RealTimeReportingBindings-missing-decl.patch * chromium-126-no-format.patch- Chromium 126.0.6478.126 (boo#1226504, boo#1226205, boo#1226933) * CVE-2024-6290: Use after free in Dawn * CVE-2024-6291: Use after free in Swiftshader * CVE-2024-6292: Use after free in Dawn * CVE-2024-6293: Use after free in Dawn * CVE-2024-6100: Type Confusion in V8 * CVE-2024-6101: Inappropriate implementation in WebAssembly * CVE-2024-6102: Out of bounds memory access in Dawn * CVE-2024-6103: Use after free in Dawn * CVE-2024-5830: Type Confusion in V8 * CVE-2024-5831: Use after free in Dawn * CVE-2024-5832: Use after free in Dawn * CVE-2024-5833: Type Confusion in V8 * CVE-2024-5834: Inappropriate implementation in Dawn * CVE-2024-5835: Heap buffer overflow in Tab Groups * CVE-2024-5836: Inappropriate Implementation in DevTools * CVE-2024-5837: Type Confusion in V8 * CVE-2024-5838: Type Confusion in V8 * CVE-2024-5839: Inappropriate Implementation in Memory Allocator * CVE-2024-5840: Policy Bypass in CORS * CVE-2024-5841: Use after free in V8 * CVE-2024-5842: Use after free in Browser UI * CVE-2024-5843: Inappropriate implementation in Downloads * CVE-2024-5844: Heap buffer overflow in Tab Strip * CVE-2024-5845: Use after free in Audio * CVE-2024-5846: Use after free in PDFium * CVE-2024-5847: Use after free in PDFium - drop patches: * chromium-disable-parallel-gold.patch * chromium-125-appservice-include.patch * chromium-125-lens-include.patch * chromium-125-mojo-bindings-include.patch * chromium-125-no-vector-consts.patch * chromium-125-vulkan-include.patch * chromium-125-ninja.patch * chromium-125-no_matching_constructor.patch * chromium-125-missing-header-files.patch - add patches: * chromium-126-missing-header-files.patch * chromium-126-quiche-interator.patch * chromium-126-no_matching_constructor.patch- Amend fix_building_widevinecdm_with_chromium.patch to allow Widevine on ARM64 (bsc#1226170)- Chromium 125.0.6422.141 (boo#1225690) * CVE-2024-5493: Heap buffer overflow in WebRTC * CVE-2024-5494: Use after free in Dawn * CVE-2024-5495: Use after free in Dawn * CVE-2024-5496: Use after free in Media Session * CVE-2024-5497: Out of bounds memory access in Keyboard Inputs * CVE-2024-5498: Use after free in Presentation API * CVE-2024-5499: Out of bounds write in Streams API- Chromium 125.0.6422.112 * CVE-2024-5274: Type Confusion in V8 (boo#1225199)- Chromium 125.0.6422.76 (boo#1224818) * CVE-2024-5157: Use after free in Scheduling * CVE-2024-5158: Type Confusion in V8 * CVE-2024-5159: Heap buffer overflow in ANGLE * CVE-2024-5160: Heap buffer overflow in Dawn * Various fixes from internal audits, fuzzing and other initiatives- Chromium 125.0.6422.60 (boo#1224341) * CVE-2024-4947: Type Confusion in V8 * CVE-2024-4948: Use after free in Dawn * CVE-2024-4949: Use after free in V8 * CVE-2024-4950: Inappropriate implementation in Downloads - Chromium 125.0.6422.41 * New upstream (early) stable release. - drop upstreamed patches: * chromium-124-uint-includes.patch * chromium-124-fps-optional.patch * chromium-124-span-optional.patch * chromium-124-extractor-bitset.patch * chromium-124-atomic.patch * chromium-124-webgpu-optional.patch * chromium-124-angle-powf.patch - add debian upstream patches added for 125: * chromium-125-appservice-include.patch * chromium-125-lens-include.patch * chromium-125-mojo-bindings-include.patch * chromium-125-no-vector-consts.patch * chromium-125-vulkan-include.patch * chromium-125-tabstrip-include.patch * chromium-125-ninja.patch - add debian fixes patches to fix font gc crashes: * chromium-125-debian-bad-font-gc0000.patch * chromium-125-debian-bad-font-gc000.patch * chromium-125-debian-bad-font-gc00.patch * chromium-125-debian-bad-font-gc0.patch * chromium-125-debian-bad-font-gc11.patch * chromium-125-debian-bad-font-gc1.patch * chromium-125-debian-bad-font-gc2.patch * chromium-125-debian-bad-font-gc3.patch - add from fedora (reverse applied for older ffmpeg): * chromium-125-ffmpeg-5.x-reordered_opaque.patch - re-diff and rename: * from chromium-110-compiler.patch to chromium-125-compiler.patch * from chromium-120-emplace-struct.patch to chromium-125-emplace-struct.patch * from chromium-disable-FFmpegAllowLists.patch to chromium-125-disable-FFmpegAllowLists.patch * from chromium-122-missing-header-files.patch to chromium-125-missing-header-files.patch * from chromium-122-no_matching_constructor.patch to chromium-125-no_matching_constructor.patch * from chromium-122-lp155-typename.patch to chromium-125-lp155-typename.patch - third_party/zstd added to keeplibs for third_party/blink/renderer/platform:platform - third_party/tflite/src/third_party/xla/xla/tsl/util added to keeplibs for third_party/tflite/tflite - third_party/lens_server_proto added to keeplibs for gen/third_party/lens_server_proto- Chromium 124.0.6367.207 (boo#1224294) * CVE-2024-4761: Out of bounds write in V8- Chromium 124.0.6367.201 (boo#1224208) * CVE-2024-4671: Use after free in Visuals - Chromium 124.0.6367.155 (boo#1224045) * CVE-2024-4558: Use after free in ANGLE * CVE-2024-4559: Heap buffer overflow in WebAudio- drop patches: * chromium-123-WebUI-static_assert.patch- Chromium 124.0.6367.118 (boo#1223846) * CVE-2024-4331: Use after free in Picture In Picture * CVE-2024-4368: Use after free in Dawn- Add patches: * chromium-123-missing-QtGui.patch - Restore libxml 2.12 check for chromium-124-system-libxml.patch which replaced chromium-121-blink-libxml-const.patch- Chromium 124.0.6367.78 (boo#1223845) * CVE-2024-4058: Type Confusion in ANGLE * CVE-2024-4059: Out of bounds read in V8 API * CVE-2024-4060: Use after free in Dawn- Chromium 124.0.6367.60 (boo#1222958) * CVE-2024-3832: Object corruption in V8. * CVE-2024-3833: Object corruption in WebAssembly. * CVE-2024-3834: Use after free in Downloads. Reported by ChaobinZhang * CVE-2024-3837: Use after free in QUIC. * CVE-2024-3838: Inappropriate implementation in Autofill. * CVE-2024-3839: Out of bounds read in Fonts. * CVE-2024-3840: Insufficient policy enforcement in Site Isolation. * CVE-2024-3841: Insufficient data validation in Browser Switcher. * CVE-2024-3843: Insufficient data validation in Downloads. * CVE-2024-3844: Inappropriate implementation in Extensions. * CVE-2024-3845: Inappropriate implementation in Network. * CVE-2024-3846: Inappropriate implementation in Prompts. * CVE-2024-3847: Insufficient policy enforcement in WebUI. - drop patches: * chromium-123-optional2.patch * chromium-122-avoid-SFINAE-TypeConverter.patch * chromium-123-PA-InternalAllocator.patch - rediff patches: * chromium-110-compiler.patch * chromium-120-emplace.patch * chromium-122-no_matching_constructor.patch * chromium-122-lp155-typename.patch - add patches: from debian/fixes * chromium-123-stats-collector.patch - add patches: from debian/upstream * chromium-124-angle-powf.patch * chromium-124-atomic.patch * chromium-124-extractor-bitset.patch * chromium-124-fps-optional.patch * chromium-124-span-optional.patch * chromium-124-uint-includes.patch * chromium-124-webgpu-optional.patch - add patches: * chromium-123-WebUI-static_assert.patch workaround for compile issue in webui_contents_wrapper.h * chromium-124-system-libxml.patch (from fedora)- Chromium 123.0.6312.122 (boo#1222707) * CVE-2024-3157: Out of bounds write in Compositing * CVE-2024-3516: Heap buffer overflow in ANGLE * CVE-2024-3515: Use after free in Dawn - Chromium 123.0.6312.105 (boo#1222260) * CVE-2024-3156: Inappropriate implementation in V8 * CVE-2024-3158: Use after free in Bookmarks * CVE-2024-3159: Out of bounds memory access in V8 - Chromium 123.0.6312.86 (boo#1222035) * CVE-2024-2883: Use after free in ANGLE * CVE-2024-2885: Use after free in Dawn * CVE-2024-2886: Use after free in WebCodecs * CVE-2024-2887: Type Confusion in WebAssembly - Chromium 123.0.6312.58 (boo#1221732) * CVE-2024-2625: Object lifecycle issue in V8 * CVE-2024-2626: Out of bounds read in Swiftshader * CVE-2024-2627: Use after free in Canvas * CVE-2024-2628: Inappropriate implementation in Downloads - drop patches: * chromium-117-blink-BUILD-mnemonic.patch * chromium-121-blink-libxml-const.patch * chromium-122-BookmarkNode-missing-operator.patch * chromium-122-WebUI-static_assert.patch * chromium-122-PA-undo-internal-alloc.patch- Use Python 3.11 on Leap - Rename chromium-122-skip_bubble_contents_wrapper_static_assert.patch to chromium-122-WebUI-static_assert.patch - Rename chromium-122-disable-FFmpegAllowLists.patch to chromium-disable-FFmpegAllowLists.patch - Rename chromium-122-static-assert.patch to chromium-122-BookmarkNode-missing-operator.patch - Rename chromium-122-undo-internal-alloc.patch to chromium-122-PA-undo-internal-alloc.patch - Rename chromium-122-typename.patch to chromium-122-lp155-typename.patch - Removed patches: * chromium-121-v8-c++20-p1.patch * chromium-121-v8-c++20.patch * chromium-122-unique_ptr.patch * chromium-122-python3-assignment-expressions.patch * chromium-122-el8-support-64kpage.patch * chromium-122-el7-inline-function.patch * chromium-122-el7-extra-operator.patch * chromium-122-el7-default-constructor-involving-anonymous-union.patch * chromium-122-constexpr.patch * chromium-122-clang-build-flags.patch * chromium-122-clang16-disable-auto-upgrade-debug-info.patch * chromium-122-clang16-buildflags.patch * chromium-122-arm64-memory_tagging.patch * chromium-121-el7-clang-version-warning.patch * chromium-116-lp155-url_load_stats-size-t.patch * chromium-icu72-2.patch * chromium-122-debian-upstream-mojo.patch - Patches merged into other patches: * chromium-122-debian-upstream-bitset.patch * chromium-122-debian-upstream-optional.patch * chromium-122-debian-upstream-uniqptr.patch * chromium-122-debian-fixes-optional.patch * chromium-122-norar.patch - Restore time clamper change to chromium-122-missing-header-files.patch - Fix missing/invalid casting in chromium-122-no_matching_constructor.patch- Chromium 122.0.6261.128 (boo#1221335) * CVE-2024-2400: Use after free in Performance Manager- Chromium 122.0.6261.111 (boo#1220131,boo#1220604,boo#1221105) * New upstream security release. * CVE-2024-2173: Out of bounds memory access in V8. * CVE-2024-2174: Inappropriate implementation in V8. * CVE-2024-2176: Use after free in FedCM. - Chromium 122.0.6261.94 * CVE-2024-1669: Out of bounds memory access in Blink. * CVE-2024-1670: Use after free in Mojo. * CVE-2024-1671: Inappropriate implementation in Site Isolation. * CVE-2024-1672: Inappropriate implementation in Content Security Policy. * CVE-2024-1673: Use after free in Accessibility. * CVE-2024-1674: Inappropriate implementation in Navigation. * CVE-2024-1675: Insufficient policy enforcement in Download. * CVE-2024-1676: Inappropriate implementation in Navigation. * Type Confusion in V8 * rediff chromium-disable-GlobalMediaControlsCastStartStop.patch * drop chromium-114-lld-argument.patch replaced by chromium-122-clang16-disable-auto-upgrade-debug-info.patch * drop chromium-121-no_matching_constructor.patch replaced by chromium-122-no_matching_constructor.patch * drop chromium-113-webview-namespace.patch (obsolete) * reduce chromium-norar.patch by the hunks in chromium-122-norar.patch * drop chromium-114-revert-av1enc-lp154.patch replaced by chromium-122-revert-av1enc-el9.patch * drop chromium-115-lp155-typename.patch chromium-116-lp155-typenames.patch chromium-117-lp155-typename.patch chromium-120-lp155-typename.patch replaced by chromium-122-typename.patch * drop chromium-121-missing-header-files.patch replaced by chromium-122-missing-header-files.patch * drop chromium-121-workaround_clang_bug-structured_binding.patch replaced by chromium-122-workaround_clang_bug-structured_binding.patch * drop chromium-121-no_matching_constructor.patch replaced by chromium-122-no_matching_constructor.patch * drop chromium-121-python3-invalid-escape-sequence.patch (upstream) * drop chromium-disable-FFmpegAllowLists.patch replaced by chromium-122-disable-FFmpegAllowLists.patch * drop chromium-121-avoid-SFINAE-TypeConverter.patch replaced by chromium-122-avoid-SFINAE-TypeConverter.patch * add buildrequires for rust * add patches from fedora package for 121 and 122 * chromium-121-el7-clang-version-warning.patch * chromium-121-v8-c++20-p1.patch * chromium-121-v8-c++20.patch * chromium-122-arm64-memory_tagging.patch * chromium-122-clang16-buildflags.patch * chromium-122-clang16-disable-auto-upgrade-debug-info.patch * chromium-122-clang-build-flags.patch * chromium-122-constexpr.patch * chromium-122-disable-FFmpegAllowLists.patch * chromium-122-el7-default-constructor-involving-anonymous-union.patch * chromium-122-el7-extra-operator.patch * chromium-122-el7-inline-function.patch * chromium-122-el8-support-64kpage.patch * chromium-122-missing-header-files.patch * chromium-122-no_matching_constructor.patch * chromium-122-norar.patch * chromium-122-python3-assignment-expressions.patch * chromium-122-revert-av1enc-el9.patch * chromium-122-static-assert.patch * chromium-122-typename.patch * chromium-122-unique_ptr.patch * chromium-122-workaround_clang_bug-structured_binding.patch * from debian add * chromium-122-undo-internal-alloc.patch * chromium-122-debian-upstream-bitset.patch * chromium-122-debian-upstream-mojo.patch * chromium-122-debian-upstream-optional.patch * chromium-122-debian-upstream-uniqptr.patch * chromium-122-debian-fixes-optional.patch * added compile fix needed on code15 chromium-122-skip_bubble_contents_wrapper_static_assert.patch to prevent "static assertion expression is not an integral constant expression" "in call to 'operator+(&"."[0], ShoppingInsightsSidePanelUI::GetWebUIName())'" in bubble_contents_wrapper.h:153 - replace Cr121-ffmpeg-new-channel-layout.patch by Cr122-ffmpeg-new-channel-layout.patch (rediff against 122) - drop chromium-121-system-old-ffmpeg.patch- Add Cr121-ffmpeg-new-channel-layout.patch to rollback more FFmpeg changes so that FFmpeg 4 will work on Leap - Prepare for libxml 2.12- Chromium 121.0.6167.184 (boo#1219118, boo#1219387, boo#1219661) * CVE-2024-1284: Use after free in Mojo * CVE-2024-1283: Heap buffer overflow in Skia * CVE-2024-1060: Use after free in Canvas * CVE-2024-1059: Use after free in WebRTC * CVE-2024-1077: Use after free in Network * CVE-2024-0807: Use after free in WebAudio * CVE-2024-0812: Inappropriate implementation in Accessibility * CVE-2024-0808: Integer underflow in WebUI * CVE-2024-0810: Insufficient policy enforcement in DevTools * CVE-2024-0814: Incorrect security UI in Payments * CVE-2024-0813: Use after free in Reading Mode * CVE-2024-0806: Use after free in Passwords * CVE-2024-0805: Inappropriate implementation in Downloads * CVE-2024-0804: Insufficient policy enforcement in iOS Security UI * CVE-2024-0811: Inappropriate implementation in Extensions API * CVE-2024-0809: Inappropriate implementation in Autofill - Removed patches: * chromium-117-includes.patch * chromium-118-includes.patch * chromium-119-dont-redefine-ATSPI-version-macros.patch * chromium-120-missing-header-files.patch * chromium-120-no_matching_constructor.patch * chromium-120-nullptr_t-without-namespace-std.patch * chromium-120-workaround_clang_bug-structured_binding.patch * gcc13-fix.patch * chromium-113-webauth-include-variant.patch * chromium-110-system-libffi.patch - Added patches: * chromium-121-no_matching_constructor.patch * chromium-121-nullptr_t-without-namespace-std.patch * chromium-121-workaround_clang_bug-structured_binding.patch * chromium-121-missing-header-files.patch * chromium-121-rust-clang_lib.patch * chromium-121-python3-invalid-escape-sequence.patch * chromium-121-rust-clang_lib.patch * chromium-121-avoid-SFINAE-TypeConverter.patch * chromium-121-blink-libxml-const.patch - Add patch chromium-disable-FFmpegAllowLists.patch: disable codec checker this will always fail (bsc#1219070)- Chromium 120.0.6099.224 (boo#1218892) * CVE-2024-0517: Out of bounds write in V8 * CVE-2024-0518: Type Confusion in V8 * CVE-2024-0519: Out of bounds memory access in V8 * Various fixes from internal audits, fuzzing and other initiatives- Replace chromium-120-lp155-revert-clang-build-failure.patch with chromium-120-make_unique-struct.patch - which avoids reverting changes and instead provides a stub constructor to fix build on Leap- Chromium 120.0.6099.216 (boo#1217839, boo#1218048, boo#1218302, boo#1218533, boo#1218719) * CVE-2024-0333: Insufficient data validation in Extensions * CVE-2024-0222: Use after free in ANGLE * CVE-2024-0223: Heap buffer overflow in ANGLE * CVE-2024-0224: Use after free in WebAudio * CVE-2024-0225: Use after free in WebGPU * CVE-2023-7024: Heap buffer overflow in WebRTC * CVE-2023-6702: Type Confusion in V8 * CVE-2023-6703: Use after free in Blink * CVE-2023-6704: Use after free in libavif (boo#1218303) * CVE-2023-6705: Use after free in WebRTC * CVE-2023-6706: Use after free in FedCM * CVE-2023-6707: Use after free in CSS * CVE-2023-6508: Use after free in Media Stream * CVE-2023-6509: Use after free in Side Panel Search * CVE-2023-6510: Use after free in Media Capture * CVE-2023-6511: Inappropriate implementation in Autofill * CVE-2023-6512: Inappropriate implementation in Web Browser UI - drop patches: * chromium-system-libusb.patch * chromium-119-nullptr_t-without-namespace-std.patch * chromium-119-no_matching_constructor.patch * chromium-117-workaround_clang_bug-structured_binding.patch - add patches: * chromium-120-nullptr_t-without-namespace-std.patch * chromium-120-emplace.patch * chromium-120-lp155-typename.patch * chromium-120-no_matching_constructor.patch * chromium-120-missing-header-files.patch * chromium-120-emplace-struct.patch * chromium-120-workaround_clang_bug-structured_binding.patch - add patches for Leap that revert braking changes: * chromium-120-lp155-revert-clang-build-failure.patch- Chromium 119.0.6045.199 (boo#1217616) * CVE-2023-6348: Type Confusion in Spellcheck * CVE-2023-6347: Use after free in Mojo * CVE-2023-6346: Use after free in WebAudio * CVE-2023-6350: Out of bounds memory access in libavif (boo#1217614) * CVE-2023-6351: Use after free in libavif (boo#1217615) * CVE-2023-6345: Integer overflow in Skia * Various fixes from internal audits, fuzzing and other initiatives- Chromium 119.0.6045.159 (boo#1217142) * CVE-2023-5997: Use after free in Garbage Collection * CVE-2023-6112: Use after free in Navigation * Various fixes from internal audits, fuzzing and other initiatives- Chromium 119.0.6045.123 (boo#1216978) * CVE-2023-5996: Use after free in WebAudio - Chromium 119.0.6045.105 (boo#1216783) * CVE-2023-5480: Inappropriate implementation in Payments * CVE-2023-5482: Insufficient data validation in USB * CVE-2023-5849: Integer overflow in USB * CVE-2023-5850: Incorrect security UI in Downloads * CVE-2023-5851: Inappropriate implementation in Downloads * CVE-2023-5852: Use after free in Printing * CVE-2023-5853: Incorrect security UI in Downloads * CVE-2023-5854: Use after free in Profiles * CVE-2023-5855: Use after free in Reading Mode * CVE-2023-5856: Use after free in Side Panel * CVE-2023-5857: Inappropriate implementation in Downloads * CVE-2023-5858: Inappropriate implementation in WebApp Provider * CVE-2023-5859: Incorrect security UI in Picture In Picture - dropped patches: * chromium-98-gtk4-build.patch * chromium-118-system-freetype.patch * chromium-118-no_matching_constructor.patch - added patches: * chromium-119-no_matching_constructor.patch * chromium-119-dont-redefine-ATSPI-version-macros.patch * chromium-119-nullptr_t-without-namespace-std.patch * chromium-119-assert.patch- Chromium 118.0.5993.117 (boo#1216549) * CVE-2023-5472: Use after free in Profiles * Various fixes from internal audits, fuzzing and other initiatives- Chromium 118.0.5993.88: * unspecified security fix (boo#1216392)- refresh chromium-117-emplace_back_on_vector-c++20.patch and chromium-117-lp155-constructors.patch to chromium-118-no_matching_constructor.patch- Chromium 118.0.5993.70 (boo#1216111) * CVE-2023-5218: Use after free in Site Isolation * CVE-2023-5487: Inappropriate implementation in Fullscreen * CVE-2023-5484: Inappropriate implementation in Navigation * CVE-2023-5475: Inappropriate implementation in DevTools * CVE-2023-5483: Inappropriate implementation in Intents * CVE-2023-5481: Inappropriate implementation in Downloads * CVE-2023-5476: Use after free in Blink History * CVE-2023-5474: Heap buffer overflow in PDF * CVE-2023-5479: Inappropriate implementation in Extensions API * CVE-2023-5485: Inappropriate implementation in Autofill * CVE-2023-5478: Inappropriate implementation in Autofill * CVE-2023-5477: Inappropriate implementation in Installer * CVE-2023-5486: Inappropriate implementation in Input * CVE-2023-5473: Use after free in Cast - Build with system freetype (again), and zstd - add patches: * chromium-118-system-freetype.patch * chromium-117-system-zstd.patch- Chromium 118.0.5993.54 - add patches: * chromium-118-includes.patch- Chromium 117.0.5938.149: * CVE-2023-5346: Type Confusion in V8 (boo#1215924)- Chromium 117.0.5938.132 (boo#1215776): * CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx (boo#1215778) * CVE-2023-5186: Use after free in Passwords * CVE-2023-5187: Use after free in Extensions- Chromium 117.0.5938.92: * stability improvements- Add explicit build dependency on libepoxy for Tumbleweed- Chromium 117.0.5938.88 (boo#1215279) * CVE-2023-4900: Inappropriate implementation in Custom Tabs * CVE-2023-4901: Inappropriate implementation in Prompts * CVE-2023-4902: Inappropriate implementation in Input * CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs * CVE-2023-4904: Insufficient policy enforcement in Downloads * CVE-2023-4905: Inappropriate implementation in Prompts * CVE-2023-4906: Insufficient policy enforcement in Autofill * CVE-2023-4907: Inappropriate implementation in Intents * CVE-2023-4908: Inappropriate implementation in Picture in Picture * CVE-2023-4909: Inappropriate implementation in Interstitials - drop patches: * chromium-100-InMilliseconds-constexpr.patch * chromium-115-Qt-moc-version.patch * chromium-116-profile-view-utils-vector-include.patch * chromium-116-blink-variant-include.patch * chromium-116-abseil-limits-include.patch * chromium-116-lp155-constuctors.patch * chromium-115-workaround_clang_bug-structured_binding.patch * chromium-115-emplace_back_on_vector-c++20.patch - add patches: * chromium-117-blink-BUILD-mnemonic.patch * chromium-117-includes.patch * chromium-117-lp155-constructors.patch * chromium-117-string-convert.patch * chromium-117-lp155-typename.patch * chromium-117-workaround_clang_bug-structured_binding.patch * chromium-117-emplace_back_on_vector-c++20.patch- CVE-2023-4863: build with the bundled library on Leap (boo#1215231)- Chromium 116.0.5845.187 (boo#1215231): * CVE-2023-4863: Heap buffer overflow in WebP- Chromium 116.0.5845.179 (boo#1215023): * CVE-2023-4761: Out of bounds memory access in FedCM * CVE-2023-4762: Type Confusion in V8 * CVE-2023-4763: Use after free in Networks * CVE-2023-4764: Incorrect security UI in BFCache- Chromium 116.0.5845.140 (boo#1214758): * CVE-2023-4572: Use after free in MediaStream- Chromium 116.0.5845.110 (boo#1214487): * CVE-2023-4427: Out of bounds memory access in V8 * CVE-2023-4428: Out of bounds memory access in CSS * CVE-2023-4429: Use after free in Loader * CVE-2023-4430: Use after free in Vulkan * CVE-2023-4431: Out of bounds memory access in Fonts- Chromium 116.0.5845.96 * New CSS features: Motion Path, and "display" and "content-visibility" animations * Web APIs: AbortSignal.any(), BYOB support for Fetch, Back/ forward cache NotRestoredReason API, Document Picture-in- Picture, Expanded Wildcards in Permissions Policy Origins, FedCM bundle: Login Hint API, User Info API, and RP Context API, Non-composed Mouse and Pointer enter/leave events, Remove document.open sandbox inheritance, Report Critical-CH caused restart in NavigationTiming - fix a number of security issues (boo#1214301): * CVE-2023-2312: Use after free in Offline * CVE-2023-4349: Use after free in Device Trust Connectors * CVE-2023-4350: Inappropriate implementation in Fullscreen * CVE-2023-4351: Use after free in Network * CVE-2023-4352: Type Confusion in V8 * CVE-2023-4353: Heap buffer overflow in ANGLE * CVE-2023-4354: Heap buffer overflow in Skia * CVE-2023-4355: Out of bounds memory access in V8 * CVE-2023-4356: Use after free in Audio * CVE-2023-4357: Insufficient validation of untrusted input in XML * CVE-2023-4358: Use after free in DNS * CVE-2023-4359: Inappropriate implementation in App Launcher * CVE-2023-4360: Inappropriate implementation in Color * CVE-2023-4361: Inappropriate implementation in Autofill * CVE-2023-4362: Heap buffer overflow in Mojom IDL * CVE-2023-4363: Inappropriate implementation in WebShare * CVE-2023-4364: Inappropriate implementation in Permission Prompts * CVE-2023-4365: Inappropriate implementation in Fullscreen * CVE-2023-4366: Use after free in Extensions * CVE-2023-4367: Insufficient policy enforcement in Extensions API * CVE-2023-4368: Insufficient policy enforcement in Extensions API - drop patches: * chromium-115-add_BoundSessionRefreshCookieFetcher::Result.patch * chromium-115-verify_name_match-include.patch * chromium-86-fix-vaapi-on-intel.patch * chromium-115-skia-include.patch * chromium-115-dont-pass-nullptr-to-construct-re2-StringPiece.patch - add patches: * chromium-116-profile-view-utils-vector-include.patch * chromium-116-blink-variant-include.patch * chromium-116-lp155-url_load_stats-size-t.patch * chromium-116-abseil-limits-include.patch * chromium-116-lp155-typenames.patch * chromium-116-lp155-constuctors.patch - Build with bundled re2 on Leap- Fix crash with extensions (boo#1214003) chromium-115-dont-pass-nullptr-to-construct-re2-StringPiece.patch- Chromium 115.0.5790.170 (boo#1213920) * CVE-2023-4068: Type Confusion in V8 * CVE-2023-4069: Type Confusion in V8 * CVE-2023-4070: Type Confusion in V8 * CVE-2023-4071: Heap buffer overflow in Visuals * CVE-2023-4072: Out of bounds read and write in WebGL * CVE-2023-4073: Out of bounds memory access in ANGLE * CVE-2023-4074: Use after free in Blink Task Scheduling * CVE-2023-4075: Use after free in Cast * CVE-2023-4076: Use after free in WebRTC * CVE-2023-4077: Insufficient data validation in Extensions * CVE-2023-4078: Inappropriate implementation in Extensions- Specify re2 build dependency in a way that makes Leap packages build in devel project and in Maintenance- Chromium 115.0.5790.102: * stability fix - Add build fixes on Leap: * chromium-115-emplace_back_on_vector-c++20.patch * chromium-115-compiler-SkColor4f.patch * chromium-115-workaround_clang_bug-structured_binding.patch * chromium-115-add_BoundSessionRefreshCookieFetcher::Result.patch - adjust chromium-115-lp155-typename.patch - drop chromium-114-workaround_clang_bug-structured_binding.patch- Chromium 115.0.5790.98 * Security: The Storage, Service Worker, and Communication APIs are now partitioned in third-party contexts to prevent certain types of side-channel cross-site tracking * HTTPS: Automatically and optimistically upgrade all main-frame navigations to HTTPS, with fast fallback to HTTP. * CSS: accept multiple values of the display property * CSS: support boolean context style container queries * CSS: support scroll-driven animations * Increase the maximum size of a WebAssembly.Module() on the main thread to 8 MB * FedCM: Support credential management mediation requirements for auto re-authentication * Deprecate the document.domain setter * Deprecate mutation events * Security fixes (boo#1213462): CVE-2023-3727: Use after free in WebRTC CVE-2023-3728: Use after free in WebRTC CVE-2023-3730: Use after free in Tab Groups CVE-2023-3732: Out of bounds memory access in Mojo CVE-2023-3733: Inappropriate implementation in WebApp Installs CVE-2023-3734: Inappropriate implementation in Picture In Picture CVE-2023-3735: Inappropriate implementation in Web API Permission Prompts CVE-2023-3736: Inappropriate implementation in Custom Tabs CVE-2023-3737: Inappropriate implementation in Notifications CVE-2023-3738: Inappropriate implementation in Autofill CVE-2023-3740: Insufficient validation of untrusted input in Themes Various fixes from internal audits, fuzzing and other initiatives - drop chromium-113-typename.patch - add chromium-115-skia-include.patch - add chromium-115-verify_name_match-include.patch - add chromium-115-lp155-typename.patch - Add chromium-115-Qt-moc-version.patch: support Qt5 & Qt6 without built-in copy of shim- Chromium 114.0.5735.198 (boo#1212755): * CVE-2023-3420: Type Confusion in V8 * CVE-2023-3421: Use after free in Media * CVE-2023-3422: Use after free in Guest View- Install Qt5 library & prepare for Qt6 in 115- Chromium 114.0.5735.133 (boo#1212302): * CVE-2023-3214: Use after free in Autofill payments * CVE-2023-3215: Use after free in WebRTC * CVE-2023-3216: Type Confusion in V8 * CVE-2023-3217: Use after free in WebXR * Various fixes from internal audits, fuzzing and other initiatives- Fix Leap 15.4 build - chromium-114-revert-av1enc-lp154.patch- Chromium 114.0.5735.106 (boo#1212044): * CVE-2023-3079: Type Confusion in V8- Chromium 114.0.5735.90 (boo#1211843): * CSS text-wrap: balance is available * Cookies partitioned by top level site (CHIPS) * New Popover API - Security fixes: * CVE-2023-2929: Out of bounds write in Swiftshader * CVE-2023-2930: Use after free in Extensions * CVE-2023-2931: Use after free in PDF * CVE-2023-2932: Use after free in PDF * CVE-2023-2933: Use after free in PDF * CVE-2023-2934: Out of bounds memory access in Mojo * CVE-2023-2935: Type Confusion in V8 * CVE-2023-2936: Type Confusion in V8 * CVE-2023-2937: Inappropriate implementation in Picture In Picture * CVE-2023-2938: Inappropriate implementation in Picture In Picture * CVE-2023-2939: Insufficient data validation in Installer * CVE-2023-2940: Inappropriate implementation in Downloads * CVE-2023-2941: Inappropriate implementation in Extensions API - Drop patches: * chromium-103-VirtualCursor-std-layout.patch * chromium-113-system-zlib.patch * chromium-113-workaround_clang_bug-structured_binding.patch - Add patches * chromium-114-workaround_clang_bug-structured_binding.patch * chromium-114-lld-argument.patch- Un-bundle zlib again - Remove un-needed patches: * chromium-112-default-comparison-operators.patch * chromium-109-clang-lp154.patch * chromium-clang-nomerge.patch * chromium-ffmpeg-lp152.patch * chromium-lp151-old-drm.patch - Added patches: * chromium-113-system-zlib.patch- build with llvm15 on Leap- Chromium 113.0.5672.126 (boo#1211442): * CVE-2023-2721: Use after free in Navigation * CVE-2023-2722: Use after free in Autofill UI * CVE-2023-2723: Use after free in DevTools * CVE-2023-2724: Type Confusion in V8 * CVE-2023-2725: Use after free in Guest View * CVE-2023-2726: Inappropriate implementation in WebApp Installs * Various fixes from internal audits, fuzzing and other initiatives- Chromium 113.0.5672.92 (boo#1211211) - Multiple security fixes (boo#1211036): * CVE-2023-2459: Inappropriate implementation in Prompts * CVE-2023-2460: Insufficient validation of untrusted input in Extensions * CVE-2023-2461: Use after free in OS Inputs * CVE-2023-2462: Inappropriate implementation in Prompts * CVE-2023-2463: Inappropriate implementation in Full Screen Mode * CVE-2023-2464: Inappropriate implementation in PictureInPicture * CVE-2023-2465: Inappropriate implementation in CORS * CVE-2023-2466: Inappropriate implementation in Prompts * CVE-2023-2467: Inappropriate implementation in Prompts * CVE-2023-2468: Inappropriate implementation in PictureInPicture - drop chromium-94-sql-no-assert.patch - drop no-location-leap151.patch - add chromium-113-webview-namespace.patch - add chromium-113-webauth-include-variant.patch - add chromium-113-typename.patch - add chromium-113-workaround_clang_bug-structured_binding.patch- Chromium 112.0.5615.165 (boo#1210618): * CVE-2023-2133: Out of bounds memory access in Service Worker API * CVE-2023-2134: Out of bounds memory access in Service Worker API * CVE-2023-2135: Use after free in DevTools * CVE-2023-2136: Integer overflow in Skia * CVE-2023-2137: Heap buffer overflow in sqlite - drop chromium-112-feed_protos.patch- Fix Leap 15.4 build failures from default comparison operators defined outside of the class definition, a C++20 feature adding chromium-112-default-comparison-operators.patch- Chromium 112.0.5615.121: * CVE-2023-2033: Type Confusion in V8 (boo#1210478)- Revert a breaking change with chromium-112-feed_protos.patch- Chromium 112.0.5615.49 * CSS now supports nesting rules. * The algorithm to set the initial focus on elements was updated. * No-op fetch() handlers on service workers are skipped from now on to make navigations faster * The setter for document.domain is now deprecated. * The recorder in devtools can now record with pierce selectors. * Security fixes (boo#1210126): * CVE-2023-1810: Heap buffer overflow in Visuals * CVE-2023-1811: Use after free in Frames * CVE-2023-1812: Out of bounds memory access in DOM Bindings * CVE-2023-1813: Inappropriate implementation in Extensions * CVE-2023-1814: Insufficient validation of untrusted input in Safe Browsing * CVE-2023-1815: Use after free in Networking APIs * CVE-2023-1816: Incorrect security UI in Picture In Picture * CVE-2023-1817: Insufficient policy enforcement in Intents * CVE-2023-1818: Use after free in Vulkan * CVE-2023-1819: Out of bounds read in Accessibility * CVE-2023-1820: Heap buffer overflow in Browser History * CVE-2023-1821: Inappropriate implementation in WebShare * CVE-2023-1822: Incorrect security UI in Navigation * CVE-2023-1823: Inappropriate implementation in FedCM- Chromium 111.0.5563.147: * nth-child() validation performance regression for SAP apps- Update gcc13-fix.patch with few fixes required for aarch64, borrowed from Fedora's gcc13 patch- Chromium 111.0.5563.110 (boo#1209598) * CVE-2023-1528: Use after free in Passwords * CVE-2023-1529: Out of bounds memory access in WebHID * CVE-2023-1530: Use after free in PDF * CVE-2023-1531: Use after free in ANGLE * CVE-2023-1532: Out of bounds read in GPU Video * CVE-2023-1533: Use after free in WebProtect * CVE-2023-1534: Out of bounds read in ANGLE- Add gcc13-fix.patch in order to support GCC 13.- Revert back to GCC 11 on 15.4 as Clang 13 doesn't support GCC 12- Bump Leap's GCC to 12 as Chromium really likes newer standards- Chromium 111.0.5563.64 * New View Transitions API * CSS Color Level 4 * New developer tools in style panel for color functionality * CSS added trigonometric functions, additional root font units and extended the n-th child pseudo selector. * previousslide and nextslide actions are now part of the Media Session API * A number of security fixes (boo#1209040) * CVE-2023-1213: Use after free in Swiftshader * CVE-2023-1214: Type Confusion in V8 * CVE-2023-1215: Type Confusion in CSS * CVE-2023-1216: Use after free in DevTools * CVE-2023-1217: Stack buffer overflow in Crash reporting * CVE-2023-1218: Use after free in WebRTC * CVE-2023-1219: Heap buffer overflow in Metrics * CVE-2023-1220: Heap buffer overflow in UMA * CVE-2023-1221: Insufficient policy enforcement in Extensions API * CVE-2023-1222: Heap buffer overflow in Web Audio API * CVE-2023-1223: Insufficient policy enforcement in Autofill * CVE-2023-1224: Insufficient policy enforcement in Web Payments API * CVE-2023-1225: Insufficient policy enforcement in Navigation * CVE-2023-1226: Insufficient policy enforcement in Web Payments API * CVE-2023-1227: Use after free in Core * CVE-2023-1228: Insufficient policy enforcement in Intents * CVE-2023-1229: Inappropriate implementation in Permission prompts * CVE-2023-1230: Inappropriate implementation in WebApp Installs * CVE-2023-1231: Inappropriate implementation in Autofill * CVE-2023-1232: Insufficient policy enforcement in Resource Timing * CVE-2023-1233: Insufficient policy enforcement in Resource Timing * CVE-2023-1234: Inappropriate implementation in Intents * CVE-2023-1235: Type Confusion in DevTools * CVE-2023-1236: Inappropriate implementation in Internals - drop patches: * chromium-86-ImageMemoryBarrierData-init.patch * chromium-93-InkDropHost-crash.patch * chromium-110-NativeThemeBase-fabs.patch * chromium-110-CredentialUIEntry-const.patch * chromium-110-DarkModeLABColorSpace-pow.patch * v8-move-the-Stack-object-from-ThreadLocalTop.patch * chromium-icu72-1.patch- Chromium 110.0.5481.177 (boo#1208589) * CVE-2023-0927: Use after free in Web Payments API * CVE-2023-0928: Use after free in SwiftShader * CVE-2023-0929: Use after free in Vulkan * CVE-2023-0930: Heap buffer overflow in Video * CVE-2023-0931: Use after free in Video * CVE-2023-0932: Use after free in WebRTC * CVE-2023-0933: Integer overflow in PDF * CVE-2023-0941: Use after free in Prompts * Various fixes from internal audits, fuzzing and other initiatives- Chromium 110.0.5481.100 * fix regression on SAP Business Objects web UI * fix date formatting behavior change from ICU 72- Chromium 110.0.5481.77 (boo#1208029): * CVE-2023-0696: Type Confusion in V8 * CVE-2023-0697: Inappropriate implementation in Full screen mode * CVE-2023-0698: Out of bounds read in WebRTC * CVE-2023-0699: Use after free in GPU * CVE-2023-0700: Inappropriate implementation in Download * CVE-2023-0701: Heap buffer overflow in WebUI * CVE-2023-0702: Type Confusion in Data Transfer * CVE-2023-0703: Type Confusion in DevTools * CVE-2023-0704: Insufficient policy enforcement in DevTools * CVE-2023-0705: Integer overflow in Core * Various fixes from internal audits, fuzzing and other initiatives - build with bundled libavif - dropped patches: * chromium-109-compiler.patch * chromium-icu72-3.patch - added patches: * chromium-110-compiler.patch * chromium-110-system-libffi.patch * chromium-110-NativeThemeBase-fabs.patch * chromium-110-CredentialUIEntry-const.patch * chromium-110-DarkModeLABColorSpace-pow.patch * v8-move-the-Stack-object-from-ThreadLocalTop.patch- Chromium 109.0.5414.119 (boo#1207512): * CVE-2023-0471: Use after free in WebTransport * CVE-2023-0472: Use after free in WebRTC * CVE-2023-0473: Type Confusion in ServiceWorker API * CVE-2023-0474: Use after free in GuestView * Various fixes from internal audits, fuzzing and other initiatives- Added patches: * chromium-icu72-1.patch: ensure TextCodecCJK doesn't conflict with system icu (bsc#1207147) * chromium-icu72-2.patch: align default characters for old icu with that of ICU 72 * chromium-icu72-3.patch: make V8 aware of space in ICU 72 time format- Chromium 109.0.5414.74: * Add support for MathML Core * CSS: Auto range support for font descriptors inside @font-face rule * CSS: Add lh length unit * CSS: Add hyphenate-limit-chars property * CSS: Snap border, outline and column-rule widths before layout * API: Improved screen sharing and web conferencing: hints for suppressing local audio playback, and Conditional Focus * API: HTTP response status code in the Resource Timing API * API: Same-site cross-origin prerendering triggered by the speculation rules API * Remove Event.path API * CVE-2023-0128: Use after free in Overview Mode * CVE-2023-0129: Heap buffer overflow in Network Service * CVE-2023-0130: Inappropriate implementation in Fullscreen API * CVE-2023-0131: Inappropriate implementation in iframe Sandbox * CVE-2023-0132: Inappropriate implementation in Permission prompts * CVE-2023-0133: Inappropriate implementation in Permission prompts * CVE-2023-0134: Use after free in Cart * CVE-2023-0135: Use after free in Cart * CVE-2023-0136: Inappropriate implementation in Fullscreen API * CVE-2023-0137: Heap buffer overflow in Platform Apps * CVE-2023-0138: Heap buffer overflow in libphonenumber * CVE-2023-0139: Insufficient validation of untrusted input in Downloads * CVE-2023-0140: Inappropriate implementation in File System API * CVE-2023-0141: Insufficient policy enforcement in CORS * Various fixes from internal audits, fuzzing and other initiatives - drop patches: * chromium-gcc11.patch - not needed * chromium-107-system-zlib.patch - upstream * chromium-108-compiler.patch - add patches: * chromium-109-compiler.patch * chromium-109-clang-lp154.patch- Add chromium-disable-GlobalMediaControlsCastStartStop.patch: disable GlobalMediaControlsCastStartStop to fix crashes occurring when interacting with the Media UI (bsc#1198124)- Chromium 108.0.5359.124 (boo#1206403): * CVE-2022-4436: Use after free in Blink Media * CVE-2022-4437: Use after free in Mojo IPC * CVE-2022-4438: Use after free in Blink Frames * CVE-2022-4439: Use after free in Aura * CVE-2022-4440: Use after free in Profiles- Chromium 108.0.5359.98 * Fix regression in computing