Format: 1.8 Date: Tue, 12 Nov 2013 14:25:20 -0500 Source: chromium-browser Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-codecs-ffmpeg chromium-codecs-ffmpeg-dbg chromium-codecs-ffmpeg-extra chromium-codecs-ffmpeg-extra-dbg chromium-chromedriver chromium-chromedriver-dbg Architecture: source Version: 31.0.1650.57-0ubuntu1 Distribution: trusty Urgency: low Maintainer: Ubuntu Developers Changed-By: Chad MILLER Description: chromium-browser - Chromium browser chromium-browser-dbg - chromium-browser debug symbols chromium-browser-l10n - chromium-browser language packages chromium-chromedriver - WebDriver driver for the Chromium Browser chromium-chromedriver-dbg - chromium-chromedriver debug symbols chromium-codecs-ffmpeg - Free ffmpeg codecs for the Chromium Browser chromium-codecs-ffmpeg-dbg - chromium-codecs-ffmpeg debug symbols chromium-codecs-ffmpeg-extra - Extra ffmpeg codecs for the Chromium Browser chromium-codecs-ffmpeg-extra-dbg - chromium-codecs-ffmpeg-extra debug symbols Launchpad-Bugs-Fixed: 1250579 Changes: chromium-browser (31.0.1650.57-0ubuntu1) trusty; urgency=low . * New release 31.0.1650.57: - CVE-2013-6632: Multiple memory corruption issues. * New release 31.0.1650.48: (LP: #1250579) - CVE-2013-6621: Use after free related to speech input elements. - CVE-2013-6622: Use after free related to media elements. - CVE-2013-6623: Out of bounds read in SVG. - CVE-2013-6624: Use after free related to "id" attribute strings. - CVE-2013-6625: Use after free in DOM ranges. - CVE-2013-6626: Address bar spoofing related to interstitial warnings. - CVE-2013-6627: Out of bounds read in HTTP parsing. - CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. - CVE-2013-2931: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo. - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo. - CVE-2013-6631: Use after free in libjingle. * debian/rules: Put actual upstream tarball inside our "orig" and unpack it at build time, and add verification of checksum. * Update webapps patches. * Disable chromedriver testing until the new server-test client dependencies are figured out. * Drop base_unittests and automated_ui_tests build and automatic test and from installation exclusion. Checksums-Sha1: 0e424a2cc72a5113454e202a968569f572f021e7 2319 chromium-browser_31.0.1650.57-0ubuntu1.dsc bdab80a3d507d9651e878f7b17909ff3bcc2ab0e 183574904 chromium-browser_31.0.1650.57.orig.tar.xz c5714a568b94d5217b38df3af7a91879d9d54c02 269034 chromium-browser_31.0.1650.57-0ubuntu1.debian.tar.gz Checksums-Sha256: 6e30afc65a0efea932206a229766b05509047e7571461e4fc1d7fe23dfa904d0 2319 chromium-browser_31.0.1650.57-0ubuntu1.dsc 8fb91d702576f3be50c0f06074cc29d3aeb3fe4487ad85447c7458b64c4c8cea 183574904 chromium-browser_31.0.1650.57.orig.tar.xz abb2647b8d0ba3bbd97af2db6dd0ac4fa21cabf997d8ff6b00ae957b698151a1 269034 chromium-browser_31.0.1650.57-0ubuntu1.debian.tar.gz Files: 02863a88e2b1381ef686a2ebdbda290e 2319 web optional chromium-browser_31.0.1650.57-0ubuntu1.dsc 49658f91ba302f641b2f44fd94497e2a 183574904 web optional chromium-browser_31.0.1650.57.orig.tar.xz 24c29960c012991cda54e9e2dda3b5b9 269034 web optional chromium-browser_31.0.1650.57-0ubuntu1.debian.tar.gz Original-Maintainer: Micah Gersten , Fabien Tassin