[Pkg-chromium-commit] [SCM] Git repository for pkg-chromium branch, master, updated. debian/22.0.1229.94_r161065-1-24-g2f4121d
Giuseppe Iuculano
iuculano at debian.org
Sat Feb 23 10:50:18 UTC 2013
The following commit has been merged in the master branch:
commit 2f4121df6ccfa4e1fbadba77828d327f00f95ff8
Author: Giuseppe Iuculano <iuculano at debian.org>
Date: Sat Feb 23 11:50:11 2013 +0100
Updated changelog
diff --git a/debian/changelog b/debian/changelog
index ac0bdcb..359a562 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,53 @@
+chromium-browser (25.0.1364.97-1) unstable; urgency=low
+
+ * New stable release:
+ - High CVE-2013-0879: Memory corruption with web audio
+ node. Credit to Atte Kettunen of OUSPG.
+ - High CVE-2013-0880: Use-after-free in database handling.
+ Credit to Chamal de Silva.
+ - Medium CVE-2013-0881: Bad read in Matroska handling. Credit to
+ Atte Kettunen of OUSPG.
+ - High CVE-2013-0882: Bad memory access with excessive SVG
+ parameters. Credit to Renata Hodovan.
+ - Medium CVE-2013-0883: Bad read in Skia. Credit to Atte
+ Kettunen of OUSPG.
+ - Low CVE-2013-0884: Inappropriate load of NaCl. Credit to Google
+ Chrome Security Team (Chris Evans).
+ - Medium CVE-2013-0885: Too many API permissions granted to web store.
+ - Low CVE-2013-0887: Developer tools process has too many
+ permissions and places too much trust in the connected server.
+ - Medium CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google
+ Chrome Security Team (Inferno).
+ - Low CVE-2013-0889: Tighten user gesture check for dangerous file
+ downloads.
+ - High CVE-2013-0890: Memory safety issues across the IPC
+ layer. Credit to Google Chrome Security Team (Chris Evans).
+ - High CVE-2013-0891: Integer overflow in blob handling. Credit to
+ Google Chrome Security Team (Jüri Aedla).
+ - Medium CVE-2013-0892: Lower severity issues across the IPC layer.
+ Credit to Google Chrome Security Team (Chris Evans).
+ - Medium CVE-2013-0893: Race condition in media handling. Credit to
+ Andrew Scherkus of the Chromium development community.
+ - High CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to
+ Google Chrome Security Team (Inferno).
+ - High CVE-2013-0895: Incorrect path handling in file
+ copying. Credit to Google Chrome Security Team (Jüri Aedla).
+ - High CVE-2013-0896: Memory management issues in plug-in message
+ handling. Credit to Google Chrome Security Team (Cris Neckar).
+ - High CVE-2013-0898: Use-after-free in URL handling. Credit to
+ Alexander Potapenko of the Chromium development community.
+ - Low CVE-2013-0899: Integer overflow in Opus handling. Credit to
+ Google Chrome Security Team (Jüri Aedla).
+ - Medium CVE-2013-0900: Race condition in ICU. Credit to Google Chrome
+ Security Team (Inferno).
+ * [a5f15ae] Added libpci-dev to B-depends
+ * [ace2b7a] Refreshed patches
+ * [32c84fa] Install remoting_locales
+ * [f868804] Do not enable NEON on ARM, thanks Ubuntu.
+ * [d1a3e36] Ignore stamp files in missing checks
+
+ -- Giuseppe Iuculano <iuculano at debian.org> Sat, 23 Feb 2013 11:45:07 +0100
+
chromium-browser (24.0.1312.68-1) unstable; urgency=high
* New stable release:
--
Git repository for pkg-chromium
More information about the Pkg-chromium-commit
mailing list