[Pkg-chromium-maint] chromium-browser_25.0.1364.152-1_i386.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Fri Mar 8 10:03:25 UTC 2013



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Tue, 05 Mar 2013 11:14:34 +0100
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-browser-inspector chromium chromium-dbg chromium-l10n chromium-inspector
Architecture: i386
Version: 25.0.1364.152-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Giuseppe Iuculano <iuculano at debian.org>
Description: 
 chromium   - Google's open source chromium web browser
 chromium-browser - Chromium browser - transitional dummy package
 chromium-browser-dbg - chromium-browser debug symbols transitional dummy package
 chromium-browser-inspector - page inspector for the chromium-browser - transitional dummy pack
 chromium-browser-l10n - chromium-browser language packages - transitional dummy package
 chromium-dbg - Debugging symbols for the chromium web browser
 chromium-inspector - page inspector for the chromium browser
 chromium-l10n - chromium-browser language packages
Changes: 
 chromium-browser (25.0.1364.152-1) unstable; urgency=high
 .
   * [8761d73] Remove armel and armhf. We cannot support them in wheezy
   * New stable security release:
     - High CVE-2013-0902: Use-after-free in frame loader. Credit to
       Chamal de Silva.
     - High CVE-2013-0903: Use-after-free in browser navigation
       handling. Credit to "chromium.khalil".
     - High CVE-2013-0904: Memory corruption in Web Audio.
       Credit to Atte Kettunen of OUSPG.
     - High CVE-2013-0905: Use-after-free with SVG animations.
       Credit to Atte Kettunen of OUSPG.
     - High CVE-2013-0906: Memory corruption in Indexed DB. Credit to Google
       Chrome Security Team (Jüri Aedla).
     - Medium CVE-2013-0907: Race condition in media thread handling. Credit
       to Andrew Scherkus of the Chromium development community.
     - Medium CVE-2013-0908: Incorrect handling of bindings for extension
       processes.
     - Low CVE-2013-0909: Referer leakage with XSS Auditor. Credit to Egor
       Homakov.
     - Medium CVE-2013-0910: Mediate renderer -> browser plug-in loads more
       strictly. Credit to Google Chrome Security Team (Chris Evans).
     - High CVE-2013-0911: Possible path traversal in database handling.
       Credit to Google Chrome Security Team (Jüri Aedla).
Checksums-Sha1: 
 ce4df863858370636a0fe6b7f5ee47e2bff31909 40070376 chromium_25.0.1364.152-1_i386.deb
 1316752990a2631caaa4f2323cb0af3118a1b3da 408118424 chromium-dbg_25.0.1364.152-1_i386.deb
Checksums-Sha256: 
 a2570eeebc18151f3d2279c79137a43292b7d08ac5daf7b8435805ed7fff8e4a 40070376 chromium_25.0.1364.152-1_i386.deb
 bd94d10fb4cd17c717bc0f2fbbb2fec3ade97bbc6bffe061354f5893ed22b4f0 408118424 chromium-dbg_25.0.1364.152-1_i386.deb
Files: 
 8178e6d2dd206f2d18d152f1e4c5801c 40070376 web optional chromium_25.0.1364.152-1_i386.deb
 860e5154cdf22ecc82dd8d8d8c662e2e 408118424 debug extra chromium-dbg_25.0.1364.152-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlE5tRgACgkQNxpp46476aoEWgCeP57TQaldAinH7N+yDoxvf74h
2gwAn0W35+1MqEofsAljvjjMIpLz3iZX
=8Qtf
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-chromium-maint mailing list