On Sun, Jan 16, 2011 at 11:42:31 +0100, Giuseppe Iuculano wrote:

> Package: release.debian.org
> Severity: normal
> User: release.debian....@packages.debian.org
> Usertags: freeze-exception
> 
> Please unblock package chromium-browser
> 
> chromium-browser (6.0.472.63~r59945-5) unstable; urgency=high
> 
>    * Backported security patches from stable:
>      - High Bad pointer handling in node iteration. Credit to Sergey Glazunov.
>      - High Stale pointer with CSS + canvas. Credit to Sergey Glazunov.
>      - High Stale pointer with CSS + cursors. Credit to Jan Tošovský.
>      - High Stale pointer with SVG use element. Credited anonymously; plus
>        indepdent discovery by miaubiz.
>      - High Vorbis decoder buffer overflows. Credit to David Warren of CERT.
>      - High Bad cast in anchor handling. Credit to Sergey Glazunov.
>      - High Bad cast in video handling. Credit to Sergey Glazunov.
>      - High Stale rendering node after DOM node removal. Credit to Martin
>        Barbella; plus independent discovery by Google Chrome Security Team
>        (SkyLined)
> 
Don't these things have CVE IDs?

Cheers,
Julien

Attachment: signature.asc
Description: Digital signature

Reply via email to