[Pkg-chromium-maint] chromium-browser_27.0.1453.93-1_i386.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Sun May 26 18:48:44 UTC 2013



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Wed, 22 May 2013 03:03:49 +0000
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-browser-inspector chromium chromium-dbg chromium-l10n chromium-inspector
Architecture: i386
Version: 27.0.1453.93-1
Distribution: unstable
Urgency: low
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert at debian.org>
Description: 
 chromium   - Google's open source chromium web browser
 chromium-browser - Chromium browser - transitional dummy package
 chromium-browser-dbg - chromium-browser debug symbols transitional dummy package
 chromium-browser-inspector - page inspector for the chromium-browser - transitional dummy pack
 chromium-browser-l10n - chromium-browser language packages - transitional dummy package
 chromium-dbg - Debugging symbols for the chromium web browser
 chromium-inspector - page inspector for the chromium browser
 chromium-l10n - chromium-browser language packages
Changes: 
 chromium-browser (27.0.1453.93-1) unstable; urgency=low
 .
   * New stable release:
     - High CVE-2013-2837: Use-after-free in SVG. Credit to Sławomir Błażek.
     - Medium CVE-2013-2838: Out-of-bounds read in v8. Credit to Christian
       Holler.
     - High CVE-2013-2839: Bad cast in clipboard handling. Credit to Jon of MWR
       InfoSecurity.
     - High CVE-2013-2840: Use-after-free in media loader. Credit to Nils of
       MWR InfoSecurity.
     - High CVE-2013-2841: Use-after-free in Pepper resource handling. Credit
       to Chamal de Silva.
     - High CVE-2013-2842: Use-after-free in widget handling. Credit to Cyril
       Cattiaux.
     - High CVE-2013-2843: Use-after-free in speech handling. Credit to Khalil
       Zhani.
     - High CVE-2013-2844: Use-after-free in style resolution. Credit to Sachin
       Shinde (@cons0ul).
     - High CVE-2013-2845: Memory safety issues in Web Audio. Credit to Atte
       Kettunen of OUSPG.
     - High CVE-2013-2846: Use-after-free in media loader. Credit to Chamal de
       Silva.
     - High CVE-2013-2847: Use-after-free race condition with workers. Credit
       to Collin Payne.
     - Medium CVE-2013-2848: Possible data extraction with XSS Auditor. Credit
       to Egor Homakov.
     - Low CVE-2013-2849: Possible XSS with drag+drop or copy+paste. Credit to
       Mario Heiderich.
Checksums-Sha1: 
 ce427d5997f320c9a3f24a79b8054245ecd4e8f9 38206314 chromium_27.0.1453.93-1_i386.deb
 26599ff7b03f5ccf8ee37a693666482711da84b7 430322820 chromium-dbg_27.0.1453.93-1_i386.deb
Checksums-Sha256: 
 2ce23eb537203c85d4490864ff80631a2f1034d68d7d67f7bc88b6ffbb6d811b 38206314 chromium_27.0.1453.93-1_i386.deb
 a20455feceb723e76115ceeec571d8f28e24cc8cae2077e84d9066b99971740f 430322820 chromium-dbg_27.0.1453.93-1_i386.deb
Files: 
 92821bf4af3d19a6c4942b2d688034bb 38206314 web optional chromium_27.0.1453.93-1_i386.deb
 db505772fed70d15c91a7645af03647a 430322820 debug extra chromium-dbg_27.0.1453.93-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlGiVhwACgkQNxpp46476aqM8ACfZun8N35OdZobNv1ZOxQWsxL0
0eEAni6sBzPRTav28XyaVkJlSidOtHMd
=5hpr
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-chromium-maint mailing list