Back to chromium-browser PTS page

Accepted chromium-browser 52.0.2743.82-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 23 Jul 2016 03:56:18 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromedriver
Architecture: source
Version: 52.0.2743.82-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromedriver - web browser - WebDriver support
 chromium   - web browser
 chromium-l10n - web browser - language packs
Changes:
 chromium-browser (52.0.2743.82-1) unstable; urgency=medium
 .
   * New upstream stable release:
     - CVE-2016-1704: Various fixes from internal audits, fuzzing and other
       initiatives.
     - CVE-2016-1705: Various fixes from internal audits, fuzzing and other
       initiatives.
     - CVE-2016-1706: Sandbox escape in PPAPI. Credit to Pinkie Pie
     - CVE-2016-1707: URL spoofing on iOS. Credit to xisigr.
     - CVE-2016-1708: Use-after-free in Extensions. Credit to Adam Varsan
     - CVE-2016-1709: Heap-buffer-overflow in sfntly. Credit to ChenQin.
     - CVE-2016-1710: Same-origin bypass in Blink. Credit to Mariusz Mlynski
     - CVE-2016-1711: Same-origin bypass in Blink. Credit to Mariusz Mlynski
     - CVE-2016-5127: Use-after-free in Blink. Credit to cloudfuzzer
     - CVE-2016-5128: Same-origin bypass in V8. Credit to Anonymous
     - CVE-2016-5129: Memory corruption in V8. Credit to Jeonghoon Shin
     - CVE-2016-5130: URL spoofing. Credit to Wadih Matar
     - CVE-2016-5131: Use-after-free in libxml. Credit to Nick Wellnhofer
     - CVE-2016-5132: Limited same-origin bypass in Service Workers. Credit to
       Ben Kelly
     - CVE-2016-5133: Origin confusion in proxy authentication. Credit to Patch
       Eudor
     - CVE-2016-5134: URL leakage via PAC script. Credit to Paul Stone
     - CVE-2016-5135: Content-Security-Policy bypass. Credit to ShenYeYinJiu
     - CVE-2016-5136: Use after free in extensions. Credit to Rob Wu
     - CVE-2016-5137: History sniffing with HSTS and CSP. Credit to Xiaoyin Liu
Checksums-Sha1:
 4bfac0f5b6258416e4ca7596aed6e12484bc8828 3921 chromium-browser_52.0.2743.82-1.dsc
 7ff038924627e302c6bbce9d5bb709ad5a2ebb25 469553332 chromium-browser_52.0.2743.82.orig.tar.xz
 0b9ca2794ba3c5b58cabd93d8c56195ae1899021 120492 chromium-browser_52.0.2743.82-1.debian.tar.xz
Checksums-Sha256:
 45dee1eb4f9b378eba06cf73b2a5e0015fbf018a82d8c5329130ad601723b4d7 3921 chromium-browser_52.0.2743.82-1.dsc
 54c85e78e4bce8db4de1df4b9218f0ce27c7722c81669652acbc795bce181d63 469553332 chromium-browser_52.0.2743.82.orig.tar.xz
 9fb84f7012bee93c4280073a927cdfdf4092850bfaf859098b2c7ba28eaa65ae 120492 chromium-browser_52.0.2743.82-1.debian.tar.xz
Files:
 558e5008ddb899bdc00d5d0a4d8e1adc 3921 web optional chromium-browser_52.0.2743.82-1.dsc
 dd4a51ce0a99714911866cf9439028be 469553332 web optional chromium-browser_52.0.2743.82.orig.tar.xz
 ca8f5d658ee124a92633f0cd5c7e50e4 120492 web optional chromium-browser_52.0.2743.82-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=
=j1rq
-----END PGP SIGNATURE-----