[Pkg-chromium-maint] chromium-browser_33.0.1750.152-1_amd64.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Fri Mar 21 18:40:38 UTC 2014
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Fri, 21 Mar 2014 17:20:44 +0100
Source: chromium-browser
Binary: chromium chromium-dbg chromium-l10n chromium-inspector chromedriver
Architecture: source all amd64
Version: 33.0.1750.152-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Giuseppe Iuculano <iuculano at debian.org>
Description:
chromedriver - WebDriver driver for Chromium browser
chromium - Chromium web browser
chromium-dbg - Debugging symbols for the chromium web browser
chromium-inspector - page inspector for the Chromium browser
chromium-l10n - chromium-browser language packages
Changes:
chromium-browser (33.0.1750.152-1) unstable; urgency=high
.
* [641361a] Disable new GN stuff
* [43cea90] Refreshed patches
* New stable release:
- High CVE-2014-1713: Use-after-free in Blink bindings
- High CVE-2014-1714: Windows clipboard vulnerability
- High CVE-2014-1705: Memory corruption in V8
- High CVE-2014-1715: Directory traversal issue
- High CVE-2014-1700: Use-after-free in speech. Credit to Chamal de Silva.
- High CVE-2014-1701: UXSS in events. Credit to aidanhs.
- High CVE-2014-1702: Use-after-free in web database.
Credit to Collin Payne.
- High CVE-2014-1703: Potential sandbox escape due to a use-after-free
in web sockets.
- CVE-2014-1704: Multiple vulnerabilities in V8 fixed in version 3.23.17.18
- High CVE-2013-6663: Use-after-free in svg images. Credit to Atte
Kettunen of OUSPG.
- High CVE-2013-6664: Use-after-free in speech recognition.
Credit to Khalil Zhani.
- High CVE-2013-6665: Heap buffer overflow in software
rendering. Credit to cloudfuzzer.
- Medium CVE-2013-6666: Chrome allows requests in flash header request.
Credit to netfuzzerr.
- CVE-2013-6667: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2013-6668: Multiple vulnerabilities in V8 fixed in version 3.24.35.10
- High CVE-2013-6653: Use-after-free related to web contents.
Credit to Khalil Zhani.
- High CVE-2013-6654: Bad cast in SVG. Credit to TheShow3511.
- High CVE-2013-6655: Use-after-free in layout. Credit to cloudfuzzer.
- High CVE-2013-6656: Information leak in XSS auditor. Credit to NeexEmil.
- Medium CVE-2013-6657: Information leak in XSS auditor. Credit to NeexEmil
- Medium CVE-2013-6658: Use-after-free in layout. Credit to cloudfuzzer.
- Medium CVE-2013-6659: Issue with certificates validation in
TLS handshake. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan
from Prosecco, Inria Paris.
- Low CVE-2013-6660: Information leak in drag and drop. Credit to
bishopjeffreys.
- Low-High CVE-2013-6661: Various fixes from internal audits, fuzzing
and other initiatives. Of these, seven are fixes for issues that could
have allowed for sandbox escapes from compromised renderers.
Checksums-Sha1:
f5d27f089ebeea17a4c33cd80114785ee7f6b731 2695 chromium-browser_33.0.1750.152-1.dsc
3789e1c8429a5e31dd4e9cc9cd8c9f1bb773057b 670022764 chromium-browser_33.0.1750.152.orig.tar.xz
0b13077a3c0ca25bb70acbca786d45d542bde429 201648 chromium-browser_33.0.1750.152-1.debian.tar.xz
327762172330204af49bf91c7f608d25576cc0fe 2982748 chromium-l10n_33.0.1750.152-1_all.deb
433e8923702af69dc34c69277a22fd41ecc55d9b 715538 chromium-inspector_33.0.1750.152-1_all.deb
c4128e95e45c0056f755e8a9081a1318990ffb4d 39081378 chromium_33.0.1750.152-1_amd64.deb
8b9cbbab84a3c1a6590426372a8e896796ff831f 589883376 chromium-dbg_33.0.1750.152-1_amd64.deb
c2ed255de9b0134b8281beb06601fb01b4a7dd11 5378466 chromedriver_33.0.1750.152-1_amd64.deb
Checksums-Sha256:
b56aed1c73d5d743681213eaade3a73983b3e5a1b6a31951fce0d639b8392201 2695 chromium-browser_33.0.1750.152-1.dsc
55cd24a70f8a4bca381b9e9dff6818aca0b38a36cfc8586f6ba8f2072d2694b9 670022764 chromium-browser_33.0.1750.152.orig.tar.xz
3af078590c3b1c6aff06b42f56f22eda2097f7339e854f80fee760862c1b6fcc 201648 chromium-browser_33.0.1750.152-1.debian.tar.xz
bfc962c14d09be1ccb5ec803a8b664e1ff7d0b1598367111c0c3102c984ca932 2982748 chromium-l10n_33.0.1750.152-1_all.deb
03705049e226b30e4376fd108bcececd42f0483530f8f31ec6343d0056d7263f 715538 chromium-inspector_33.0.1750.152-1_all.deb
b213dd6e7b0a0bcd94cad487c306d4773e3808993f607790bf4aba8485f10788 39081378 chromium_33.0.1750.152-1_amd64.deb
517e5c5eee75fabdd0354601430903b4178819fc90a33e76dd4ff5219c2ef818 589883376 chromium-dbg_33.0.1750.152-1_amd64.deb
64454e973c1442e972f9a41300d397e2c3ab5414e1876361ff0601318bb299fd 5378466 chromedriver_33.0.1750.152-1_amd64.deb
Files:
92db1c335fdf47664cba117275699acf 2695 web optional chromium-browser_33.0.1750.152-1.dsc
15f5ac11068064206335942bb1e1b9b7 670022764 web optional chromium-browser_33.0.1750.152.orig.tar.xz
21a2a9fb4cb05613ea368b4c5de06900 201648 web optional chromium-browser_33.0.1750.152-1.debian.tar.xz
ab185cd1725c476c85f456191cd37202 2982748 localization optional chromium-l10n_33.0.1750.152-1_all.deb
a481fb4e838ef39489fdce023293c309 715538 web optional chromium-inspector_33.0.1750.152-1_all.deb
a71b3d6964d998b6ad70fb3f26cf2dbb 39081378 web optional chromium_33.0.1750.152-1_amd64.deb
15aa29fbcaba085745e434bcbecd2a9d 589883376 debug extra chromium-dbg_33.0.1750.152-1_amd64.deb
d35e0f158d7fc8b7d88d3a94842dbb7c 5378466 web optional chromedriver_33.0.1750.152-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iEYEARECAAYFAlMshA4ACgkQNxpp46476aphewCglGvsL21fnu3xFXy9ZlhEAu+Z
ZSYAni6shLqb+2b7GzZuoddT5/UoVAW+
=qtpF
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the Pkg-chromium-maint
mailing list