[Pkg-chromium-maint] chromium-browser_26.0.1410.43-1_i386.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Tue Apr 2 18:48:11 UTC 2013
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Sat, 30 Mar 2013 14:44:33 +0000
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-browser-inspector chromium chromium-dbg chromium-l10n chromium-inspector
Architecture: i386
Version: 26.0.1410.43-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert at debian.org>
Description:
chromium - Google's open source chromium web browser
chromium-browser - Chromium browser - transitional dummy package
chromium-browser-dbg - chromium-browser debug symbols transitional dummy package
chromium-browser-inspector - page inspector for the chromium-browser - transitional dummy pack
chromium-browser-l10n - chromium-browser language packages - transitional dummy package
chromium-dbg - Debugging symbols for the chromium web browser
chromium-inspector - page inspector for the chromium browser
chromium-l10n - chromium-browser language packages
Changes:
chromium-browser (26.0.1410.43-1) unstable; urgency=medium
.
* New stable release:
- High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen
of OUSPG.
- Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google
Chrome Security Team (Cris Neckar).
- Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit
to Vsevolod Vlasov of the Chromium development community.
- Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions.
Credit to Google Chrome Security Team (Mustafa Emre Acer).
- Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit
to Google Chrome Security Team (Mustafa Emre Acer).
- High CVE-2013-0921: Ensure isolated web sites run in their own processes.
- Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to
“t3553r”.
- Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to
Google Chrome Security Team (Mustafa Emre Acer).
- Low CVE-2013-0924: Check an extension’s permissions API usage again file
permissions. Credit to Benjamin Kalman of the Chromium development
community.
- Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs
permissions. Credit to Michael Vrable of Google.
- Medium CVE-2013-0926: Avoid pasting active tags in certain situations.
Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c.
* Use embedded libvpx for vp9 support, which chromium now requires.
* Add libspeechd-dev build-dependency.
* Disable breakpad crash reporting.
Checksums-Sha1:
89b00aea6ae2ee7f07c17593c98647bddcd6c55e 41201844 chromium_26.0.1410.43-1_i386.deb
ffee6cfd8b49ea1f6df348676c35ca894b3ba227 422984302 chromium-dbg_26.0.1410.43-1_i386.deb
Checksums-Sha256:
53338d0fd0d327ecc35c48bd00758f0a3a258e31344e5a1ef7ed4a36641c7786 41201844 chromium_26.0.1410.43-1_i386.deb
814c7d8b4f8c0e9dc6c3809d33d5eaf1441da95d2ebff519d513865a430715e5 422984302 chromium-dbg_26.0.1410.43-1_i386.deb
Files:
830d68ebc09ee79bbc8dd63347fd0be7 41201844 web optional chromium_26.0.1410.43-1_i386.deb
a95f535f0c8d49cc40cdfe49f06219ba 422984302 debug extra chromium-dbg_26.0.1410.43-1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlFbJDIACgkQNxpp46476aokGACfdRl0lR0S/n+8tooOG612HvM6
URQAnRBbYV9GNP8KlpyUa2Ft3zWLhYZQ
=cOUy
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the Pkg-chromium-maint
mailing list