[Pkg-chromium-maint] chromium-browser_33.0.1750.152-1_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Fri Mar 21 18:40:38 UTC 2014



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Fri, 21 Mar 2014 17:20:44 +0100
Source: chromium-browser
Binary: chromium chromium-dbg chromium-l10n chromium-inspector chromedriver
Architecture: source all amd64
Version: 33.0.1750.152-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Giuseppe Iuculano <iuculano at debian.org>
Description: 
 chromedriver - WebDriver driver for Chromium browser
 chromium   - Chromium web browser
 chromium-dbg - Debugging symbols for the chromium web browser
 chromium-inspector - page inspector for the Chromium browser
 chromium-l10n - chromium-browser language packages
Changes: 
 chromium-browser (33.0.1750.152-1) unstable; urgency=high
 .
   * [641361a] Disable new GN stuff
   * [43cea90] Refreshed patches
   * New stable release:
     - High CVE-2014-1713: Use-after-free in Blink bindings
     - High CVE-2014-1714: Windows clipboard vulnerability
     - High CVE-2014-1705: Memory corruption in V8
     - High CVE-2014-1715: Directory traversal issue
     - High CVE-2014-1700: Use-after-free in speech. Credit to Chamal de Silva.
     - High CVE-2014-1701: UXSS in events. Credit to aidanhs.
     - High CVE-2014-1702: Use-after-free in web database.
       Credit to Collin Payne.
     - High CVE-2014-1703: Potential sandbox escape due to a use-after-free
       in web sockets.
     - CVE-2014-1704: Multiple vulnerabilities in V8 fixed in version 3.23.17.18
     - High CVE-2013-6663: Use-after-free in svg images. Credit to Atte
       Kettunen of OUSPG.
     - High CVE-2013-6664: Use-after-free in speech recognition.
       Credit to Khalil Zhani.
     - High CVE-2013-6665: Heap buffer overflow in software
       rendering. Credit to cloudfuzzer.
     - Medium CVE-2013-6666: Chrome allows requests in flash header request.
       Credit to netfuzzerr.
     - CVE-2013-6667: Various fixes from internal audits, fuzzing and other
       initiatives.
     - CVE-2013-6668: Multiple vulnerabilities in V8 fixed in version 3.24.35.10
     - High CVE-2013-6653: Use-after-free related to web contents.
       Credit to Khalil Zhani.
     - High CVE-2013-6654: Bad cast in SVG. Credit to TheShow3511.
     - High CVE-2013-6655: Use-after-free in layout. Credit to cloudfuzzer.
     - High CVE-2013-6656: Information leak in XSS auditor. Credit to NeexEmil.
     - Medium CVE-2013-6657: Information leak in XSS auditor. Credit to NeexEmil
     - Medium CVE-2013-6658: Use-after-free in layout. Credit to cloudfuzzer.
     - Medium CVE-2013-6659: Issue with certificates validation in
       TLS handshake. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan
       from Prosecco, Inria Paris.
     - Low CVE-2013-6660: Information leak in drag and drop. Credit to
       bishopjeffreys.
     - Low-High CVE-2013-6661: Various fixes from internal audits, fuzzing
       and other initiatives. Of these, seven are fixes for issues that could
       have allowed for sandbox escapes from compromised renderers.
Checksums-Sha1: 
 f5d27f089ebeea17a4c33cd80114785ee7f6b731 2695 chromium-browser_33.0.1750.152-1.dsc
 3789e1c8429a5e31dd4e9cc9cd8c9f1bb773057b 670022764 chromium-browser_33.0.1750.152.orig.tar.xz
 0b13077a3c0ca25bb70acbca786d45d542bde429 201648 chromium-browser_33.0.1750.152-1.debian.tar.xz
 327762172330204af49bf91c7f608d25576cc0fe 2982748 chromium-l10n_33.0.1750.152-1_all.deb
 433e8923702af69dc34c69277a22fd41ecc55d9b 715538 chromium-inspector_33.0.1750.152-1_all.deb
 c4128e95e45c0056f755e8a9081a1318990ffb4d 39081378 chromium_33.0.1750.152-1_amd64.deb
 8b9cbbab84a3c1a6590426372a8e896796ff831f 589883376 chromium-dbg_33.0.1750.152-1_amd64.deb
 c2ed255de9b0134b8281beb06601fb01b4a7dd11 5378466 chromedriver_33.0.1750.152-1_amd64.deb
Checksums-Sha256: 
 b56aed1c73d5d743681213eaade3a73983b3e5a1b6a31951fce0d639b8392201 2695 chromium-browser_33.0.1750.152-1.dsc
 55cd24a70f8a4bca381b9e9dff6818aca0b38a36cfc8586f6ba8f2072d2694b9 670022764 chromium-browser_33.0.1750.152.orig.tar.xz
 3af078590c3b1c6aff06b42f56f22eda2097f7339e854f80fee760862c1b6fcc 201648 chromium-browser_33.0.1750.152-1.debian.tar.xz
 bfc962c14d09be1ccb5ec803a8b664e1ff7d0b1598367111c0c3102c984ca932 2982748 chromium-l10n_33.0.1750.152-1_all.deb
 03705049e226b30e4376fd108bcececd42f0483530f8f31ec6343d0056d7263f 715538 chromium-inspector_33.0.1750.152-1_all.deb
 b213dd6e7b0a0bcd94cad487c306d4773e3808993f607790bf4aba8485f10788 39081378 chromium_33.0.1750.152-1_amd64.deb
 517e5c5eee75fabdd0354601430903b4178819fc90a33e76dd4ff5219c2ef818 589883376 chromium-dbg_33.0.1750.152-1_amd64.deb
 64454e973c1442e972f9a41300d397e2c3ab5414e1876361ff0601318bb299fd 5378466 chromedriver_33.0.1750.152-1_amd64.deb
Files: 
 92db1c335fdf47664cba117275699acf 2695 web optional chromium-browser_33.0.1750.152-1.dsc
 15f5ac11068064206335942bb1e1b9b7 670022764 web optional chromium-browser_33.0.1750.152.orig.tar.xz
 21a2a9fb4cb05613ea368b4c5de06900 201648 web optional chromium-browser_33.0.1750.152-1.debian.tar.xz
 ab185cd1725c476c85f456191cd37202 2982748 localization optional chromium-l10n_33.0.1750.152-1_all.deb
 a481fb4e838ef39489fdce023293c309 715538 web optional chromium-inspector_33.0.1750.152-1_all.deb
 a71b3d6964d998b6ad70fb3f26cf2dbb 39081378 web optional chromium_33.0.1750.152-1_amd64.deb
 15aa29fbcaba085745e434bcbecd2a9d 589883376 debug extra chromium-dbg_33.0.1750.152-1_amd64.deb
 d35e0f158d7fc8b7d88d3a94842dbb7c 5378466 web optional chromedriver_33.0.1750.152-1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iEYEARECAAYFAlMshA4ACgkQNxpp46476aphewCglGvsL21fnu3xFXy9ZlhEAu+Z
ZSYAni6shLqb+2b7GzZuoddT5/UoVAW+
=qtpF
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-chromium-maint mailing list