Back to chromium-browser PTS page

Accepted chromium-browser 53.0.2785.89-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 03 Sep 2016 16:30:44 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromedriver
Architecture: source
Version: 53.0.2785.89-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromedriver - web browser - WebDriver support
 chromium   - web browser
 chromium-l10n - web browser - language packs
Changes:
 chromium-browser (53.0.2785.89-1) unstable; urgency=medium
 .
   * New upstream stable release:
     - CVE-2016-5147: Universal XSS in Blink. Credit to anonymous
     - CVE-2016-5148: Universal XSS in Blink. Credit to anonymous
     - CVE-2016-5149: Script injection in extensions. Credit to Max Justicz
     - CVE-2016-5150: Use after free in Blink. Credit to anonymous
     - CVE-2016-5151: Use after free in PDFium. Credit to anonymous
     - CVE-2016-5152: Heap overflow in PDFium. Credit to GiWan Go of Stealien
     - CVE-2016-5153: Use after destruction in Blink. Credit to Atte Kettunen
     - CVE-2016-5154: Heap overflow in PDFium. Credit to anonymous
     - CVE-2016-5155: Address bar spoofing. Credit to anonymous
     - CVE-2016-5156: Use after free in event bindings. Credit to jinmo123
     - CVE-2016-5157: Heap overflow in PDFium. Credit to anonymous
     - CVE-2016-5158: Heap overflow in PDFium. Credit to GiWan Go
     - CVE-2016-5159: Heap overflow in PDFium. Credit to GiWan Go
     - CVE-2016-5160: Extensions web accessible resources bypass. Credit to
       @l33terally
     - CVE-2016-5161: Type confusion in Blink.
     - CVE-2016-5162: Extensions web accessible resources bypass. Credit to
       Nicolas Golubovic
     - CVE-2016-5163: Address bar spoofing. Credit to Rafay Baloch
     - CVE-2016-5164: Universal XSS using DevTools. Credit to anonymous
     - CVE-2016-5165: Script injection in DevTools. Credit to Gregory Panakkal
     - CVE-2016-5166: SMB Relay Attack via Save Page As. Credit to Gregory
       Panakkal
     - CVE-2016-5167: Various fixes from internal audits, fuzzing and other
       initiatives.
Checksums-Sha1:
 5ff57e4817327f2d0e151c93c23d027785d2e571 3927 chromium-browser_53.0.2785.89-1.dsc
 dae2e8945a16af41add3248235ff3ea58fe93859 471772292 chromium-browser_53.0.2785.89.orig.tar.xz
 d2bea5e6a67d867638178976ae6de84424507d2e 122720 chromium-browser_53.0.2785.89-1.debian.tar.xz
Checksums-Sha256:
 8aaa1842d2460e951f4c12215bf6128749a121f98faca618878d22aaa055db97 3927 chromium-browser_53.0.2785.89-1.dsc
 6b5a2187330950f716e61e8d416c69751858139c1ae76e504ab97c56e7512c40 471772292 chromium-browser_53.0.2785.89.orig.tar.xz
 280b8e42e418a1049fb19be2062827e5286da49df54931df827bfe1cf92971da 122720 chromium-browser_53.0.2785.89-1.debian.tar.xz
Files:
 3dc410a2a12f99fd0e70187eeecd6b9f 3927 web optional chromium-browser_53.0.2785.89-1.dsc
 71bc7fcbb9e3ef6612e9e0582dbba60c 471772292 web optional chromium-browser_53.0.2785.89.orig.tar.xz
 1b4da3c80ad835577bc616d15f02d73e 122720 web optional chromium-browser_53.0.2785.89-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=
=Je2u
-----END PGP SIGNATURE-----