[Pkg-chromium-commit] [pkg-chromium] 04/04: release 51.0.2704.63-2

Michael Gilbert mgilbert at moszumanska.debian.org
Sun May 29 19:36:48 UTC 2016


This is an automated email from the git hooks/post-receive script.

mgilbert pushed a commit to branch master
in repository pkg-chromium.

commit 231c0b0c867447cfc440c7f684d00c1ee8d7efe7
Author: Michael Gilbert <mgilbert at debian.org>
Date:   Sun May 29 19:36:55 2016 +0000

    release 51.0.2704.63-2
---
 debian/changelog                    | 49 +++++++++++++++++++++++++++++++++++++
 debian/control                      |  2 +-
 debian/patches/series               |  1 +
 debian/patches/system/speechd.patch | 14 +++++++++++
 debian/rules                        |  1 -
 5 files changed, 65 insertions(+), 2 deletions(-)

diff --git a/debian/changelog b/debian/changelog
index aa763f2..5829f2a 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,3 +1,52 @@
+chromium-browser (51.0.2704.63-2) unstable; urgency=medium
+
+  * Fix libspeechd build error.
+
+ -- Michael Gilbert <mgilbert at debian.org>  Sun, 29 May 2016 01:42:46 +0000
+
+chromium-browser (51.0.2704.63-1) unstable; urgency=medium
+
+  * New upstream stable release:
+    - CVE-2016-1667: Same origin bypass in DOM. Credit to Mariusz Mlynski.
+    - CVE-2016-1668: Same origin bypass in Blink V8 bindings. Credit to
+      Mariusz Mlynski.
+    - CVE-2016-1669: Buffer overflow in V8. Credit to Choongwoo Han.
+    - CVE-2016-1670: Race condition in loader. Credit to anonymous.
+    - CVE-2016-1672: Cross-origin bypass in extension bindings. Credit to
+      Mariusz Mlynski.
+    - CVE-2016-1673: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
+    - CVE-2016-1674: Cross-origin bypass in extensions. Credit to Mariusz
+      Mlynski.
+    - CVE-2016-1675: Cross-origin bypass in Blink. Credit to Mariusz Mlynski.
+    - CVE-2016-1676: Cross-origin bypass in extension bindings. Credit to Rob
+      Wu.
+    - CVE-2016-1677: Type confusion in V8. Credit to Guang Gong.
+    - CVE-2016-1678: Heap overflow in V8. Credit to Christian Holler.
+    - CVE-2016-1679: Heap use-after-free in V8 bindings. Credit to Rob Wu.
+    - CVE-2016-1680: Heap use-after-free in Skia. Credit to Atte Kettunen.
+    - CVE-2016-1681: Heap overflow in PDFium. Credit to Aleksandar Nikolic.
+    - CVE-2016-1682: CSP bypass for ServiceWorker. Credit to KingstonTime.
+    - CVE-2016-1683: Out-of-bounds access in libxslt. Credit to Nicolas
+      Gregoire.
+    - CVE-2016-1684: Integer overflow in libxslt. Credit to Nicolas Gregoire.
+    - CVE-2016-1685: Out-of-bounds read in PDFium. Credit to Ke Liu.
+    - CVE-2016-1686: Out-of-bounds read in PDFium. Credit to Ke Liu.
+    - CVE-2016-1687: Information leak in extensions. Credit to Rob Wu.
+    - CVE-2016-1688: Out-of-bounds read in V8. Credit to Max Korenko.
+    - CVE-2016-1689: Heap buffer overflow in media. Credit to Atte Kettunen.
+    - CVE-2016-1690: Heap use-after-free in Autofill. Credit to Rob Wu.
+    - CVE-2016-1691: Heap buffer-overflow in Skia. Credit to Atte Kettunen.
+    - CVE-2016-1692: Limited cross-origin bypass in ServiceWorker. Credit to
+      Til Jasper Ullrich.
+    - CVE-2016-1693: HTTP Download of Software Removal Tool. Credit to Khalil
+      Zhani.
+    - CVE-2016-1694: HPKP pins removed on cache clearance. Credit to Ryan
+      Lester and Bryant Zadegan.
+    - CVE-2016-1695: Various fixes from internal audits, fuzzing and other
+      initiatives.
+
+ -- Michael Gilbert <mgilbert at debian.org>  Fri, 27 May 2016 01:52:42 +0000
+
 chromium-browser (50.0.2661.94-1) unstable; urgency=medium
 
   * New upstream security release:
diff --git a/debian/control b/debian/control
index 947d34a..9f4e0e2 100644
--- a/debian/control
+++ b/debian/control
@@ -66,7 +66,7 @@ Build-Depends:
  libasound2-dev,
  libsqlite3-dev,
  libjsoncpp-dev,
- libspeechd-dev,
+ libspeechd-dev (>= 0.8.4),
  libminizip-dev,
  libhunspell-dev,
  libmodpbase64-dev,
diff --git a/debian/patches/series b/debian/patches/series
index d6167b5..4b7cbf6 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -18,3 +18,4 @@ system/clang.patch
 system/ffmpeg.patch
 
 webui.patch
+system/speechd.patch
diff --git a/debian/patches/system/speechd.patch b/debian/patches/system/speechd.patch
new file mode 100644
index 0000000..dce87a1
--- /dev/null
+++ b/debian/patches/system/speechd.patch
@@ -0,0 +1,14 @@
+description: fix path to speechd headers
+author: Michael Gilbert <mgilbert at debian.org>
+
+--- a/build/linux/system.gyp
++++ b/build/linux/system.gyp
+@@ -1141,7 +1141,7 @@
+             # speech-dispatcher < 0.8 we can get rid of all this (including
+             # third_party/speech-dispatcher) and just include
+             # speech-dispatcher/libspeechd.h unconditionally.
+-            'libspeechd_h_prefix%': '',
++            'libspeechd_h_prefix%': 'speech-dispatcher/',
+           },
+           'action_name': 'generate_libspeechd_loader',
+           'inputs': [
diff --git a/debian/rules b/debian/rules
index 483fa7e..5b46df8 100755
--- a/debian/rules
+++ b/debian/rules
@@ -59,7 +59,6 @@ defines+=use_system_re2=1 \
          use_system_expat=1 \
          use_system_libpng=1 \
          use_system_libxml=1 \
-         use_system_ffmpeg=1 \
          use_system_libjpeg=1 \
          use_system_libwebp=1 \
          use_system_libxslt=1 \

-- 
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-chromium/pkg-chromium.git



More information about the Pkg-chromium-commit mailing list