Back to chromium-browser PTS page

Accepted chromium-browser 55.0.2883.75-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 02 Dec 2016 02:06:59 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromedriver
Architecture: source
Version: 55.0.2883.75-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromedriver - web browser - WebDriver support
 chromium   - web browser
 chromium-l10n - web browser - language packs
Closes: 845785
Changes:
 chromium-browser (55.0.2883.75-1) unstable; urgency=medium
 .
   * New upstream stable release:
     - CVE-2016-9651: Private property access in V8. Credit to Guang Gong
     - CVE-2016-5208: Universal XSS in Blink. Credit to Mariusz Mlynski
     - CVE-2016-5207: Universal XSS in Blink. Credit to Mariusz Mlynski
     - CVE-2016-5206: Same-origin bypass in PDFium. Credit to Rob Wu
     - CVE-2016-5205: Universal XSS in Blink. Credit to Anonymous
     - CVE-2016-5204: Universal XSS in Blink. Credit to Mariusz Mlynski
     - CVE-2016-5209: Out of bounds write in Blink. Credit to Giwan Go
     - CVE-2016-5203: Use after free in PDFium. Credit to Anonymous
     - CVE-2016-5210: Out of bounds write in PDFium. Credit to Ke Liu
     - CVE-2016-5212: Local file disclosure in DevTools. Credit to Khalil Zhani
     - CVE-2016-5211: Use after free in PDFium. Credit to Anonymous
     - CVE-2016-5213: Use after free in V8. Credit to Khalil Zhani
     - CVE-2016-5214: File download protection bypass. Credit to Jonathan Birch
       and MSVR
     - CVE-2016-5216: Use after free in PDFium. Credit to Anonymous
     - CVE-2016-5215: Use after free in Webaudio. Credit to Looben Yang
     - CVE-2016-5217: Use of unvalidated data in PDFium. Credit to Rob Wu
     - CVE-2016-5218: Address spoofing in Omnibox. Credit to Abdulrahman
       Alqabandi
     - CVE-2016-5219: Use after free in V8. Credit to Rob Wu
     - CVE-2016-5221: Integer overflow in ANGLE. Credit to Tim Becker
     - CVE-2016-5220: Local file access in PDFium. Credit to Rob Wu
     - CVE-2016-5222: Address spoofing in Omnibox. Credit to xisigr
     - CVE-2016-9650: CSP Referrer disclosure. Credit to Jakub Żoczek
     - CVE-2016-5223: Integer overflow in PDFium. Credit to Hwiwon Lee
     - CVE-2016-5226: Limited XSS in Blink. Credit to Jun Kokatsu
     - CVE-2016-5225: CSP bypass in Blink. Credit to Scott Helme
     - CVE-2016-5224: Same-origin bypass in SVG. Credit to Roeland Krak
     - CVE-2016-9652: Various fixes from internal audits, fuzzing and other
       initiatives
   * Make it possible to pass build flags into gn (closes: #845785).
Checksums-Sha1:
 2860537b005b6bdc31a7d4cdc018b97e8745828c 3990 chromium-browser_55.0.2883.75-1.dsc
 7e19210a25ae94e17b0fd93625642d1d59697dc8 472986664 chromium-browser_55.0.2883.75.orig.tar.xz
 4b4b1ce841dedcdd7ff8fff4242ae2df05b4eb4c 114268 chromium-browser_55.0.2883.75-1.debian.tar.xz
Checksums-Sha256:
 12953e90fc00200f678b2ee6915e70d5524952d98042d57037d2a98dfe4bf9d1 3990 chromium-browser_55.0.2883.75-1.dsc
 8b4a7109aeb40f1804d584151649a6b2ca70d0da459fe86daeaa0f5f3c6ea358 472986664 chromium-browser_55.0.2883.75.orig.tar.xz
 2476b5583ec983fc8ac63e3cfe62deba9c75d9786ac0ff7d25a2fecb58645688 114268 chromium-browser_55.0.2883.75-1.debian.tar.xz
Files:
 88eb70a38bb1103f141b95012e1fb856 3990 web optional chromium-browser_55.0.2883.75-1.dsc
 6ea097ad1d73444f40359f54ad9bf396 472986664 web optional chromium-browser_55.0.2883.75.orig.tar.xz
 e9f93b1966aca686e9fc77a040c5cce6 114268 web optional chromium-browser_55.0.2883.75-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=2f0l
-----END PGP SIGNATURE-----