[Pkg-chromium-maint] chromium-browser_44.0.2403.89-1_amd64.changes ACCEPTED into unstable

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed Jul 22 23:22:29 UTC 2015



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 21 Jul 2015 22:33:06 +0000
Source: chromium-browser
Binary: chromium chromium-dbg chromium-l10n chromedriver
Architecture: source all
Version: 44.0.2403.89-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert at debian.org>
Description:
 chromedriver - web browser - WebDriver support
 chromium   - web browser
 chromium-dbg - web browser - debugging symbols
 chromium-l10n - web browser - language packs
Changes:
 chromium-browser (44.0.2403.89-1) unstable; urgency=medium
 .
   * New upstream stable release:
     - CVE-2015-1270: Uninitialized memory read in ICU. Credit to Atte Kettunen.
     - CVE-2015-1271: Heap-buffer-overflow in pdfium. Credit to cloudfuzzer.
     - CVE-2015-1272: Use-after-free related to unexpected GPU process
       termination. Credit to Chamal de Silva.
     - CVE-2015-1273: Heap-buffer-overflow in pdfium. Credit to makosoft.
     - CVE-2015-1274: Settings allowed executable files to run immediately after
       download. Credit to  andrewm.bpi.
     - CVE-2015-1275: UXSS in Chrome for Android. Credit to WangTao(neobyte).
     - CVE-2015-1276: Use-after-free in IndexedDB. Credit to Collin Payne.
     - CVE-2015-1277: Use-after-free in accessibility. Credit to SkyLined.
     - CVE-2015-1278: URL spoofing using pdf files. Credit to Chamal de Silva.
     - CVE-2015-1279: Heap-buffer-overflow in pdfium. Credit to mlafon.
     - CVE-2015-1280: Memory corruption in skia. Credit to cloudfuzzer.
     - CVE-2015-1281: CSP bypass. Credit to Masato Kinugawa.
     - CVE-2015-1282: Use-after-free in pdfium. Credit to Chamal de Silva.
     - CVE-2015-1283: Heap-buffer-overflow in expat. Credit to Huzaifa
       Sidhpurwala.
     - CVE-2015-1284: Use-after-free in blink. Credit to Atte Kettunen.
     - CVE-2015-1285: Information leak in XSS auditor. Credit to gazheyes.
     - CVE-2015-1286: UXSS in blink. Credit to anonymous.
     - CVE-2015-1287: SOP bypass with CSS. Credit to filedescriptor.
     - CVE-2015-1288: Spell checking dictionaries fetched over HTTP. Credit to
       Mike Ruddy.
     - CVE-2015-1289: Various fixes from internal audits, fuzzing and other
       initiatives.
   * Remove hotword patch, now disabled by default upstream.
Checksums-Sha1:
 017bc5fc54fccb2803d8064048da14e0e52806f8 3925 chromium-browser_44.0.2403.89-1.dsc
 cf3eb6f3c7499dc1bcfd7a2019e0ab70b250bcd3 296959120 chromium-browser_44.0.2403.89.orig.tar.xz
 c2b41961de883d13a44f7255fa2a4afbe2e3aa5e 156148 chromium-browser_44.0.2403.89-1.debian.tar.xz
 93220b93543fe82483e4708d21b39ccd8b6fbfdc 3152144 chromium-l10n_44.0.2403.89-1_all.deb
Checksums-Sha256:
 bbaea769f4b01431b1d1628bda7be7bd157fd2e824be07dca9234dd187d2d0bb 3925 chromium-browser_44.0.2403.89-1.dsc
 e2f494deaad414445241ef196aa1e49f52c70a221c698da1d36b35982db64b7b 296959120 chromium-browser_44.0.2403.89.orig.tar.xz
 422394945bbfc38a712a09ec0e2864ab5d32ce006a7354c2e35674e6f0c18360 156148 chromium-browser_44.0.2403.89-1.debian.tar.xz
 5d4cf863aef89e377fb5bbcb5aa36279e2ad4187a6de1f7ae3a54846ba0eaed1 3152144 chromium-l10n_44.0.2403.89-1_all.deb
Files:
 0b2d9ad5606b78d1088e5176cacb9d78 3925 web optional chromium-browser_44.0.2403.89-1.dsc
 69a473b7276dbed7045c05600c24a01c 296959120 web optional chromium-browser_44.0.2403.89.orig.tar.xz
 f553a197bcb99289f3f5b2aa46d41a3b 156148 web optional chromium-browser_44.0.2403.89-1.debian.tar.xz
 f21b7afe586ec6491ad6647d8b31547e 3152144 localization optional chromium-l10n_44.0.2403.89-1_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=
=U88c
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-chromium-maint mailing list