[Pkg-chromium-commit] [pkg-chromium] 04/04: release 51.0.2704.63-2
Michael Gilbert
mgilbert at moszumanska.debian.org
Sun May 29 19:36:48 UTC 2016
This is an automated email from the git hooks/post-receive script.
mgilbert pushed a commit to branch master
in repository pkg-chromium.
commit 231c0b0c867447cfc440c7f684d00c1ee8d7efe7
Author: Michael Gilbert <mgilbert at debian.org>
Date: Sun May 29 19:36:55 2016 +0000
release 51.0.2704.63-2
---
debian/changelog | 49 +++++++++++++++++++++++++++++++++++++
debian/control | 2 +-
debian/patches/series | 1 +
debian/patches/system/speechd.patch | 14 +++++++++++
debian/rules | 1 -
5 files changed, 65 insertions(+), 2 deletions(-)
diff --git a/debian/changelog b/debian/changelog
index aa763f2..5829f2a 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,52 @@
+chromium-browser (51.0.2704.63-2) unstable; urgency=medium
+
+ * Fix libspeechd build error.
+
+ -- Michael Gilbert <mgilbert at debian.org> Sun, 29 May 2016 01:42:46 +0000
+
+chromium-browser (51.0.2704.63-1) unstable; urgency=medium
+
+ * New upstream stable release:
+ - CVE-2016-1667: Same origin bypass in DOM. Credit to Mariusz Mlynski.
+ - CVE-2016-1668: Same origin bypass in Blink V8 bindings. Credit to
+ Mariusz Mlynski.
+ - CVE-2016-1669: Buffer overflow in V8. Credit to Choongwoo Han.
+ - CVE-2016-1670: Race condition in loader. Credit to anonymous.
+ - CVE-2016-1672: Cross-origin bypass in extension bindings. Credit to
+ Mariusz Mlynski.
+ - CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
+ - CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz
+ Mlynski.
+ - CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
+ - CVE-2016-1676: Cross-origin bypass in extension bindings. Credit to Rob
+ Wu.
+ - CVE-2016-1677: Type confusion in V8. Credit to Guang Gong.
+ - CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
+ - CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
+ - CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen.
+ - CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic.
+ - CVE-2016-1682: CSP bypass for ServiceWorker. Credit to KingstonTime.
+ - CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas
+ Gregoire.
+ - CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas Gregoire.
+ - CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu.
+ - CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu.
+ - CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
+ - CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
+ - CVE-2016-1689: Heap buffer overflow in media. Credit to Atte Kettunen.
+ - CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
+ - CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen.
+ - CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit to
+ Til Jasper Ullrich.
+ - CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to Khalil
+ Zhani.
+ - CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan
+ Lester and Bryant Zadegan.
+ - CVE-2016-1695: Various fixes from internal audits, fuzzing and other
+ initiatives.
+
+ -- Michael Gilbert <mgilbert at debian.org> Fri, 27 May 2016 01:52:42 +0000
+
chromium-browser (50.0.2661.94-1) unstable; urgency=medium
* New upstream security release:
diff --git a/debian/control b/debian/control
index 947d34a..9f4e0e2 100644
--- a/debian/control
+++ b/debian/control
@@ -66,7 +66,7 @@ Build-Depends:
libasound2-dev,
libsqlite3-dev,
libjsoncpp-dev,
- libspeechd-dev,
+ libspeechd-dev (>= 0.8.4),
libminizip-dev,
libhunspell-dev,
libmodpbase64-dev,
diff --git a/debian/patches/series b/debian/patches/series
index d6167b5..4b7cbf6 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -18,3 +18,4 @@ system/clang.patch
system/ffmpeg.patch
webui.patch
+system/speechd.patch
diff --git a/debian/patches/system/speechd.patch b/debian/patches/system/speechd.patch
new file mode 100644
index 0000000..dce87a1
--- /dev/null
+++ b/debian/patches/system/speechd.patch
@@ -0,0 +1,14 @@
+description: fix path to speechd headers
+author: Michael Gilbert <mgilbert at debian.org>
+
+--- a/build/linux/system.gyp
++++ b/build/linux/system.gyp
+@@ -1141,7 +1141,7 @@
+ # speech-dispatcher < 0.8 we can get rid of all this (including
+ # third_party/speech-dispatcher) and just include
+ # speech-dispatcher/libspeechd.h unconditionally.
+- 'libspeechd_h_prefix%': '',
++ 'libspeechd_h_prefix%': 'speech-dispatcher/',
+ },
+ 'action_name': 'generate_libspeechd_loader',
+ 'inputs': [
diff --git a/debian/rules b/debian/rules
index 483fa7e..5b46df8 100755
--- a/debian/rules
+++ b/debian/rules
@@ -59,7 +59,6 @@ defines+=use_system_re2=1 \
use_system_expat=1 \
use_system_libpng=1 \
use_system_libxml=1 \
- use_system_ffmpeg=1 \
use_system_libjpeg=1 \
use_system_libwebp=1 \
use_system_libxslt=1 \
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-chromium/pkg-chromium.git
More information about the Pkg-chromium-commit
mailing list