[Pkg-chromium-maint] chromium-browser_26.0.1410.43-1_i386.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Tue Apr 2 18:48:11 UTC 2013


Hash: SHA1

Format: 1.8
Date: Sat, 30 Mar 2013 14:44:33 +0000
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-browser-inspector chromium chromium-dbg chromium-l10n chromium-inspector
Architecture: i386
Version: 26.0.1410.43-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert at debian.org>
 chromium   - Google's open source chromium web browser
 chromium-browser - Chromium browser - transitional dummy package
 chromium-browser-dbg - chromium-browser debug symbols transitional dummy package
 chromium-browser-inspector - page inspector for the chromium-browser - transitional dummy pack
 chromium-browser-l10n - chromium-browser language packages - transitional dummy package
 chromium-dbg - Debugging symbols for the chromium web browser
 chromium-inspector - page inspector for the chromium browser
 chromium-l10n - chromium-browser language packages
 chromium-browser (26.0.1410.43-1) unstable; urgency=medium
   * New stable release:
     - High CVE-2013-0916: Use-after-free in Web Audio. Credit to Atte Kettunen
       of OUSPG.
     - Low CVE-2013-0917: Out-of-bounds read in URL loader. Credit to Google
       Chrome Security Team (Cris Neckar).
     - Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. Credit
       to Vsevolod Vlasov of the Chromium development community.
     - Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions.
       Credit to Google Chrome Security Team (Mustafa Emre Acer).
     - Medium CVE-2013-0920: Use-after-free in extension bookmarks API. Credit
       to Google Chrome Security Team (Mustafa Emre Acer).
     - High CVE-2013-0921: Ensure isolated web sites run in their own processes.
     - Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. Credit to
     - Medium CVE-2013-0923: Memory safety issues in the USB Apps API. Credit to
       Google Chrome Security Team (Mustafa Emre Acer).
     - Low CVE-2013-0924: Check an extension’s permissions API usage again file
       permissions. Credit to Benjamin Kalman of the Chromium development
     - Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs
       permissions. Credit to Michael Vrable of Google.
     - Medium CVE-2013-0926: Avoid pasting active tags in certain situations.
       Credit to Subho Halder, Aditya Gupta, and Dev Kar of xys3c.
   * Use embedded libvpx for vp9 support, which chromium now requires.
   * Add libspeechd-dev build-dependency.
   * Disable breakpad crash reporting.
 89b00aea6ae2ee7f07c17593c98647bddcd6c55e 41201844 chromium_26.0.1410.43-1_i386.deb
 ffee6cfd8b49ea1f6df348676c35ca894b3ba227 422984302 chromium-dbg_26.0.1410.43-1_i386.deb
 53338d0fd0d327ecc35c48bd00758f0a3a258e31344e5a1ef7ed4a36641c7786 41201844 chromium_26.0.1410.43-1_i386.deb
 814c7d8b4f8c0e9dc6c3809d33d5eaf1441da95d2ebff519d513865a430715e5 422984302 chromium-dbg_26.0.1410.43-1_i386.deb
 830d68ebc09ee79bbc8dd63347fd0be7 41201844 web optional chromium_26.0.1410.43-1_i386.deb
 a95f535f0c8d49cc40cdfe49f06219ba 422984302 debug extra chromium-dbg_26.0.1410.43-1_i386.deb

Version: GnuPG v1.4.12 (GNU/Linux)


Thank you for your contribution to Debian.

More information about the Pkg-chromium-maint mailing list