[Pkg-chromium-maint] chromium-browser_55.0.2883.75-1~deb8u1_i386.changes ACCEPTED into proposed-updates->stable-new
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Sun Dec 11 21:34:16 UTC 2016
Mapping stable-security to proposed-updates.
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 11 Dec 2016 04:48:45 +0000
Source: chromium-browser
Binary: chromium chromium-dbg chromium-l10n chromium-inspector chromedriver
Architecture: source i386 all
Version: 55.0.2883.75-1~deb8u1
Distribution: jessie-security
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint at lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert at debian.org>
Description:
chromedriver - web browser - WebDriver support
chromium - web browser
chromium-dbg - web browser - debugging symbols
chromium-inspector - web browser - page inspection support
chromium-l10n - web browser - language packs
Closes: 844631
Changes:
chromium-browser (55.0.2883.75-1~deb8u1) jessie-security; urgency=medium
.
* New upstream stable release:
- CVE-2016-5181: Universal XSS in Blink. Credit to Anonymous
- CVE-2016-5182: Heap overflow in Blink. Credit to Giwan Go
- CVE-2016-5183: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5184: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5185: Use after free in Blink. Credit to cloudfuzzer
- CVE-2016-5186: Out of bounds read in DevTools. Credit to Abdulrahman
- CVE-2016-5187: URL spoofing. Credit to Luan Herrera
- CVE-2016-5188: UI spoofing. Credit to Luan Herrera
haojunhou at gmail.com
- CVE-2016-5189: URL spoofing. Credit to xisigr
Alqabandi
- CVE-2016-5190: Use after free in Internals. Credit to Atte Kettunen
- CVE-2016-5191: Universal XSS in Bookmarks. Credit to Gareth Hughes
- CVE-2016-5192: Cross-origin bypass in Blink. Credit to
- CVE-2016-5193: Scheme bypass. Credit to Yuyang ZHOU
- CVE-2016-5194: Various fixes from internal audits, fuzzing and other
initiatives
- CVE-2016-5198: Out of bounds memory access in V8. Credit to Tencent Keen
Security Lab
- CVE-2016-5200: Out of bounds memory access in V8. Credit to Choongwoo Han
- CVE-2016-5201: Info leak in extensions. Credit to Rob Wu
- CVE-2016-5202: Various fixes from internal audits, fuzzing and other
initiatives
- CVE-2016-5203: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5204: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5205: Universal XSS in Blink. Credit to Anonymous
- CVE-2016-5206: Same-origin bypass in PDFium. Credit to Rob Wu
- CVE-2016-5207: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5208: Universal XSS in Blink. Credit to Mariusz Mlynski
- CVE-2016-5209: Out of bounds write in Blink. Credit to Giwan Go
- CVE-2016-5210: Out of bounds write in PDFium. Credit to Ke Liu
- CVE-2016-5211: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5212: Local file disclosure in DevTools. Credit to Khalil Zhani
- CVE-2016-5213: Use after free in V8. Credit to Khalil Zhani
- CVE-2016-5214: File download protection bypass. Credit to Jonathan Birch
and MSVR
- CVE-2016-5215: Use after free in Webaudio. Credit to Looben Yang
- CVE-2016-5216: Use after free in PDFium. Credit to Anonymous
- CVE-2016-5217: Use of unvalidated data in PDFium. Credit to Rob Wu
- CVE-2016-5218: Address spoofing in Omnibox. Credit to Abdulrahman
Alqabandi
- CVE-2016-5219: Use after free in V8. Credit to Rob Wu
- CVE-2016-5220: Local file access in PDFium. Credit to Rob Wu
- CVE-2016-5221: Integer overflow in ANGLE. Credit to Tim Becker
- CVE-2016-5222: Address spoofing in Omnibox. Credit to xisigr
- CVE-2016-5223: Integer overflow in PDFium. Credit to Hwiwon Lee
- CVE-2016-5224: Same-origin bypass in SVG. Credit to Roeland Krak
- CVE-2016-5225: CSP bypass in Blink. Credit to Scott Helme
- CVE-2016-5226: Limited XSS in Blink. Credit to Jun Kokatsu
- CVE-2016-9650: CSP Referrer disclosure. Credit to Jakub Żoczek
- CVE-2016-9651: Private property access in V8. Credit to Guang Gong
- CVE-2016-9652: Various fixes from internal audits, fuzzing and other
initiatives
- Certificate validity is now independent of the browser build date
(closes: #844631).
- No longer supports gyp build system, so update to use gn instead.
Checksums-Sha1:
c708b399bf09b950a2543fbc7efe64e58552a685 4087 chromium-browser_55.0.2883.75-1~deb8u1.dsc
7e19210a25ae94e17b0fd93625642d1d59697dc8 472986664 chromium-browser_55.0.2883.75.orig.tar.xz
22043abb4ee3fe9f3a9566482e0a08a3625ea1f0 183480 chromium-browser_55.0.2883.75-1~deb8u1.debian.tar.xz
1c7eaf51d1d5f7da58e6216c86cac5e1d9072d6e 42461718 chromium_55.0.2883.75-1~deb8u1_i386.deb
1ae8009a9095a527790365f7f4697a748e2d2432 6933910 chromium-dbg_55.0.2883.75-1~deb8u1_i386.deb
b4231eed97d384edb380b8660adb4aa95cf23a98 3339348 chromium-l10n_55.0.2883.75-1~deb8u1_all.deb
fb8186b902598cfcdf1fd2e576441892d4872461 1404218 chromium-inspector_55.0.2883.75-1~deb8u1_all.deb
052dcc08525b2ad6ec3907e97bcdebc6cbb2acd4 2624408 chromedriver_55.0.2883.75-1~deb8u1_i386.deb
Checksums-Sha256:
fda2905fabd8557dd8e0d85e8fdbee46acda16e7a62f5792306e0457b9846d18 4087 chromium-browser_55.0.2883.75-1~deb8u1.dsc
8b4a7109aeb40f1804d584151649a6b2ca70d0da459fe86daeaa0f5f3c6ea358 472986664 chromium-browser_55.0.2883.75.orig.tar.xz
055a9f090d001a6c7b619c291796b17611c8d935e617da1f06501ce1d2238ff7 183480 chromium-browser_55.0.2883.75-1~deb8u1.debian.tar.xz
d2b25c5f689f5dc45467a355b93f310d49602b54ba3116993750a9400e4222be 42461718 chromium_55.0.2883.75-1~deb8u1_i386.deb
b1d1d6ec538fc76f9d83a4d99da102b0c42ebd87fd91403bb065b2888871fd8a 6933910 chromium-dbg_55.0.2883.75-1~deb8u1_i386.deb
a5120d3ba01a5cb4966ce540318a0b6904d95125515cea9356372da7077e8ea6 3339348 chromium-l10n_55.0.2883.75-1~deb8u1_all.deb
f623318dabe60bda281db285d26a1a14ccb3302cffdcdb52166bd759dedc27ce 1404218 chromium-inspector_55.0.2883.75-1~deb8u1_all.deb
b3e537c0bf35ea168ecd3d3935d220def7c49c06771a4f020df7675c87445662 2624408 chromedriver_55.0.2883.75-1~deb8u1_i386.deb
Files:
4a5091cc667678b97a0d71d7cf9efd83 4087 web optional chromium-browser_55.0.2883.75-1~deb8u1.dsc
6ea097ad1d73444f40359f54ad9bf396 472986664 web optional chromium-browser_55.0.2883.75.orig.tar.xz
a2fbf7b8e7b607a89dd96d11645f4c6d 183480 web optional chromium-browser_55.0.2883.75-1~deb8u1.debian.tar.xz
615f1cc64b6b8b2c4ac670a91470c1d1 42461718 web optional chromium_55.0.2883.75-1~deb8u1_i386.deb
75d710eb62663e3d63c3c84a8e7db9a4 6933910 debug extra chromium-dbg_55.0.2883.75-1~deb8u1_i386.deb
327a01b2d004d15c0f5a76fdf745ea5f 3339348 localization optional chromium-l10n_55.0.2883.75-1~deb8u1_all.deb
493f5fffc7c88d53e20e3e0242399a35 1404218 web optional chromium-inspector_55.0.2883.75-1~deb8u1_all.deb
baab5cb8f34c2b7d8bf63e0a6f583b34 2624408 web optional chromedriver_55.0.2883.75-1~deb8u1_i386.deb
-----BEGIN PGP SIGNATURE-----
iQQzBAEBCgAdFiEEluhy7ASCBulP9FUWuNayzQLW9HMFAlhNYboACgkQuNayzQLW
9HN/3B//azWVQoO6a+Txr9FEvvbRfpKpT3U+R3AKv6a2QBJJQ/tUYyBs+2SKb5Yb
YXmYNn9p3wKvU2taZTyO6pBgD4/DeAjVAvNssCsrRbB7azB/BfLjZhBrr5vC5+cj
LGZz0GTqOSIHjEg0aGMeZX2qReZN2X+keM6Sf2oAmmSPgsl1hdpR2NsrDgi+x/ZX
itOyDkE4KUdKkxbAuZnxrofWsaHPARPHf9jYnH2RKudHzbwx1kDFQprr/F/7UxpD
vIWpG67eoiol+S+DE4OVTJ2pb8Jm8EJsGJk+JBXaXmWX6r4PRFHYTcPoQKxfe5QW
O5ijXwB4ISwetJw6dhqgSZu2Kc9IFLNp1hghO72+ZVdcKXxditiziRL3PnLo/+dZ
wlA+ADEen96OlTvSRCqjWJhYtU6WK4zQrvEyBGr+q0KMCf8c2pd67qfdel/hbTUx
d92om6zm21Txy/SaeTuwY4RydGmtdRSS3OMyFpgcaHqmxz/PtXkgS6oAJ4vnipdQ
eVhZW6Uv30rZmMeGHjRHiYG1K6h6wjLcdcl/7STWF2psWPGFkxH6iQsKpfOw4/Qq
C42seyk/bM2bpDscV9Jn8tcxK060+b+eUcFiUPVaGGYa9nqsybfHo2vo/oMhWLzB
lli6Yj7psaV+hyMi9o41fVEc1WwfV+fJAcDTfol4cIt0jeBWZUnGqJeHA81v86xX
jrIPzacNfWWSfu/RSMkSz90H9Ruc6F4IFHwa4sK8xiMvyl03ukNR8dLXb4Y3DZCC
uQ3pECw1k88OWRQc6iuCN1Igwiav/jUWqRmM21SVSRx1BPaHpAVeGk/O/3BJYcJX
3hpNAVh9XhoA+6viF+qVkJ4nW3hVdZqNWQ8okw1Dq0hC/z6MfkQ+iuWyrJNhe3ZS
zlxThr6CyUOQPW1cbt4muHmZV4rsburEjP443em/9XTkeB0hyN+7pUf7mbQ8rq5h
pSviLTjz+5pa38QdNVikOAF5eS65BXmQL+boGiWyrBOVxjBePDfGMXP9oZhkjz/5
e6o2Sr3Hy+SXbjLgbi3uRj4LuS1fHlVkIbuLKdZOGTd6vivBWi8uq1xyD3+wqyDl
lI9NmfvD3d6PvHIj4RmB6AsfkaADveKQ5avBBNxumD4xGliPYYdALhmG7mRDsE6z
wKbZbGxM7BmhpK44gRkHLyr8U8URbnz4N3siTZGKXHrPGAKCTpU5fvPLGGBW7dqN
iYCuepafY9ZcFuBarWGgZo58bfzyNQUbaKNSyyVnb23z+ZrHGAgHuanZ4wrWd8gN
idAm9QWAAkZK8T7HdTCYWlCMWaVcgxn7rIiQf44hkpqiUfOTrpOcpRI2igm/gkKi
TBdQ1SNl4HHKV89/0YVL2K62QPmuBg==
=OJL5
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the Pkg-chromium-maint
mailing list