Back to chromium-browser PTS page

Accepted chromium-browser 57.0.2987.98-1 (source) into unstable



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 10 Mar 2017 22:00:06 +0000
Source: chromium-browser
Binary: chromium chromium-l10n chromium-shell chromium-widevine chromium-driver chromedriver
Architecture: source
Version: 57.0.2987.98-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org>
Changed-By: Michael Gilbert <mgilbert@debian.org>
Description:
 chromedriver - web browser - WebDriver support transitional package
 chromium   - web browser
 chromium-driver - web browser - WebDriver support
 chromium-l10n - web browser - language packs
 chromium-shell - web browser - minimal shell
 chromium-widevine - web browser - widevine content decryption support
Changes:
 chromium-browser (57.0.2987.98-1) unstable; urgency=medium
 .
   * New upstream stable release.
     - CVE-2017-5030: Memory corruption in V8. Credit to Brendon Tiszka
     - CVE-2017-5031: Use after free in ANGLE. Credit to Looben Yang
     - CVE-2017-5032: Out of bounds write in PDFium. Credit to Ashfaq Ansari
     - CVE-2017-5029: Integer overflow in libxslt. Credit to Holger Fuhrmannek
     - CVE-2017-5034: Use after free in PDFium. Credit to Ke Liu
     - CVE-2017-5035: Incorrect security UI in Omnibox. Credit to Enzo Aguado
     - CVE-2017-5036: Use after free in PDFium. Credit to Anonymous
     - CVE-2017-5037: Multiple out of bounds writes in ChunkDemuxer. Credit to
       Yongke Wang
     - CVE-2017-5039: Use after free in PDFium. Credit to jinmo123
     - CVE-2017-5040: Information disclosure in V8. Credit to Choongwoo Han
     - CVE-2017-5041: Address spoofing in Omnibox. Credit to Jordi Chancel
     - CVE-2017-5033: Bypass of Content Security Policy in Blink. Credit to
       Nicolai Grødum
     - CVE-2017-5042: Incorrect handling of cookies in Cast. Credit to Mike
       Ruddy
     - CVE-2017-5038: Use after free in GuestView. Credit to Anonymous
     - CVE-2017-5043: Use after free in GuestView. Credit to Anonymous
     - CVE-2017-5044: Heap overflow in Skia. Credit to Kushal Arvind Shah
     - CVE-2017-5045: Information disclosure in XSS Auditor. Credit to Dhaval
       Kapil
     - CVE-2017-5046: Information disclosure in Blink. Credit to Masato Kinugawa
   * Drop arm and MADV_FREE patches, which are now applied upstream.
Checksums-Sha1:
 4dd1f693cd7fd7c77eacb9d3394ac1c133fffc00 4324 chromium-browser_57.0.2987.98-1.dsc
 22a8c32dc35bcfbe57159f9ca7b396d799567fb6 481398480 chromium-browser_57.0.2987.98.orig.tar.xz
 89ad269b80379b3714e41313ad1871fc6aec71af 131184 chromium-browser_57.0.2987.98-1.debian.tar.xz
 362aedf6e943af8676f04bff16894a60425f57e6 19234 chromium-browser_57.0.2987.98-1_source.buildinfo
Checksums-Sha256:
 4379888169a2708f144deec1aa44ba731e7bcf1ab636847799d4158225b867bc 4324 chromium-browser_57.0.2987.98-1.dsc
 6c7bfd6e226a0e94dca91479b94c444c162d2a834d65e08208d25692bc1e0e9c 481398480 chromium-browser_57.0.2987.98.orig.tar.xz
 e17954319f058af94d31223b3508f0dfde569e59c0ad5c1418d3e70713d10386 131184 chromium-browser_57.0.2987.98-1.debian.tar.xz
 64098947d5eb0bd5f5c065cdc90db777a20eb3b2adda29253857a9a5fb19818e 19234 chromium-browser_57.0.2987.98-1_source.buildinfo
Files:
 0f0fbcd7835ed505ad2830e62b7ef03a 4324 web optional chromium-browser_57.0.2987.98-1.dsc
 e5b393a2b3000f5cadf3c0ee4b11e206 481398480 web optional chromium-browser_57.0.2987.98.orig.tar.xz
 798465f42f272abc4077dae8a58c2a7b 131184 web optional chromium-browser_57.0.2987.98-1.debian.tar.xz
 fe239bf0040cbd8ed2cac4676131a075 19234 web optional chromium-browser_57.0.2987.98-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=YEoW
-----END PGP SIGNATURE-----