Your message dated Wed, 06 Feb 2013 17:53:41 +0000
with message-id <[email protected]>
and subject line Bug#686561: fixed in chromium-browser 24.0.1312.68-1
has caused the Debian Bug report #686561,
regarding chromium: Invalid link in debian/control Homepage header
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
686561: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=686561
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: chromium
Version: 21.0.1180.89~r154005-1
Severity: minor
Control: tags -1 +patch
Dear Maintainer,
The "Homepage" header currently links to not-working
"http://code.google.com/chromium" page.
It should be "http://www.chromium.org/Home" instead.
Please find the patch attached.
--
Dmitry Shachnev
From 5270ff439949f139fac8c357cb63ed180dba719d Mon Sep 17 00:00:00 2001
From: Dmitry Shachnev <[email protected]>
Date: Mon, 3 Sep 2012 13:57:25 +0400
Subject: [PATCH] Fix link in Homepage header
---
debian/control | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/debian/control b/debian/control
index 30679ef..b739f72 100644
--- a/debian/control
+++ b/debian/control
@@ -7,7 +7,7 @@ Uploaders:
Michael Gilbert <[email protected]>
Vcs-Git: git://git.debian.org/git/pkg-chromium/pkg-chromium.git
Vcs-Browser: http://anonscm.debian.org/gitweb/?p=pkg-chromium/pkg-chromium.git
-Homepage: http://code.google.com/chromium/
+Homepage: http://www.chromium.org/Home
Build-Depends: cdbs,
debhelper (>= 7),
g++-4.6,
--
1.7.9.5
signature.asc
Description: This is a digitally signed message part
--- End Message ---
--- Begin Message ---
Source: chromium-browser
Source-Version: 24.0.1312.68-1
We believe that the bug you reported is fixed in the latest version of
chromium-browser, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Giuseppe Iuculano <[email protected]> (supplier of updated chromium-browser
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 06 Feb 2013 15:34:17 +0100
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n
chromium-browser-inspector chromium chromium-dbg chromium-l10n
chromium-inspector
Architecture: source all amd64
Version: 24.0.1312.68-1
Distribution: unstable
Urgency: high
Maintainer: Debian Chromium Maintainers
<[email protected]>
Changed-By: Giuseppe Iuculano <[email protected]>
Description:
chromium - Google's open source chromium web browser
chromium-browser - Chromium browser - transitional dummy package
chromium-browser-dbg - chromium-browser debug symbols transitional dummy
package
chromium-browser-inspector - page inspector for the chromium-browser -
transitional dummy pack
chromium-browser-l10n - chromium-browser language packages - transitional
dummy package
chromium-dbg - Debugging symbols for the chromium web browser
chromium-inspector - page inspector for the chromium browser
chromium-l10n - chromium-browser language packages
Closes: 686561 695703
Changes:
chromium-browser (24.0.1312.68-1) unstable; urgency=high
.
* New stable release:
- High CVE-2013-0839: Use-after-free in canvas font handling.
Credit to Atte Kettunen of OUSPG.
- Medium CVE-2013-0840: Missing URL validation when opening new
windows.
- High CVE-2013-0841: Unchecked array index in content blocking. Credit
to Google Chrome Security Team (Chris Evans).
- Medium CVE-2013-0842: Problems with NULL characters embedded in
paths. Credit to Google Chrome Security Team (Jüri Aedla).
- High CVE-2012-5145: Use-after-free in SVG layout. Credit to
Atte Kettunen of OUSPG.
- High CVE-2012-5146: Same origin policy bypass with malformed
URL. Credit to Erling A Ellingsen and Subodh Iyengar, both of Facebook.
- High CVE-2012-5147: Use-after-free in DOM handling. Credit to
José A. Vázquez.
- Medium CVE-2012-5148: Missing filename sanitization in hyphenation
support. Credit to Google Chrome Security Team (Justin Schuh).
- High CVE-2012-5149: Integer overflow in audio IPC handling. Credit to
Google Chrome Security Team (Chris Evans).
- High CVE-2012-5150: Use-after-free when seeking video. Credit to
Google Chrome Security Team (Inferno).
- High CVE-2012-5151: Integer overflow in PDF JavaScript. Credit to
Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google
Security Team.
- Medium CVE-2012-5152: Out-of-bounds read when seeking video. Credit
to Google Chrome Security Team (Inferno).
- High CVE-2012-5153: Out-of-bounds stack access in v8. Credit to
Andreas Rossberg of the Chromium development community.
- High CVE-2013-0829: Corruption of database metadata leading to
incorrect file access. Credit to Google Chrome Security Team (Jüri
Aedla).
- Low CVE-2013-0831: Possible path traversal from extension process.
Credit to Google Chrome Security Team (Tom Sepez).
- [160380] Medium CVE-2013-0832: Use-after-free with printing. Credit to
Google
Chrome Security Team (Cris Neckar).
- Medium CVE-2013-0833: Out-of-bounds read with printing. Credit to
Google Chrome Security Team (Cris Neckar).
- Medium CVE-2013-0834: Out-of-bounds read with glyph handling. Credit
to Google Chrome Security Team (Cris Neckar).
- Low CVE-2013-0835: Browser crash with geolocation. Credit to Arthur
Gerkis.
- High CVE-2013-0836: Crash in v8 garbage collection. Credit to Google
Chrome Security Team (Cris Neckar).
- Medium CVE-2013-0837: Crash in extension tab handling. Credit to Tom
Nielsen.
- Low CVE-2013-0838: Tighten permissions on shared memory
segments. Credit to Google Chrome Security Team (Chris Palmer).
- High CVE-2012-5139: Use-after-free with visibility events.
Credit to Chamal de Silva.
- High CVE-2012-5140: Use-after-free in URL loader. Credit to
Chamal de Silva.
- Medium CVE-2012-5141: Limit Chromoting client plug-in instantiation.
Credit to Google Chrome Security Team (Jüri Aedla).
- Critical CVE-2012-5142: Crash in history navigation. Credit to Michal
Zalewski of Google Security Team.
- Medium CVE-2012-5143: Integer overflow in PPAPI image buffers. Credit
to Google Chrome Security Team (Cris Neckar).
- High CVE-2012-5144: Stack corruption in AAC decoding. Credit
to pawlkt.
- High CVE-2012-5138: Incorrect file path handling. Credit to Google
Chrome Security Team (Jüri Aedla).
- High CVE-2012-5137: Use-after-free in media source handling.
Credit to Pinkie Pie.
- High CVE-2012-5133: Use-after-free in SVG filters. Credit to
miaubiz.
- Medium CVE-2012-5130: Out-of-bounds read in Skia. Credit to
Atte Kettunen of OUSPG.
- Low CVE-2012-5132: Browser crash with chunked encoding. Credit to
Attila Szász.
- High CVE-2012-5134: Buffer underflow in libxml. Credit to Google
Chrome Security Team (Jüri Aedla).
- Medium CVE-2012-5135: Use-after-free with printing. Credit to Fermin
Serna of Google Security Team.
- Medium CVE-2012-5136: Bad cast in input element handling. Credit to
Google Chrome Security Team (Inferno).
- Medium CVE-2012-5127: Integer overflow leading to
out-of-bounds read in WebP handling. Credit to Phil Turnbull.
- [Linux 64-bit only] Medium CVE-2012-5120: Out-of-bounds array
access in v8. Credit to Atte Kettunen of OUSPG.
- High CVE-2012-5116: Use-after-free in SVG filter handling.
Credit to miaubiz.
- High CVE-2012-5121: Use-after-free in video layout. Credit to
Atte Kettunen of OUSPG.
- Low CVE-2012-5117: Inappropriate load of SVG subresource in img
context. Credit to Felix Gröbert of the Google Security Team.
- Medium CVE-2012-5119: Race condition in Pepper buffer handling.
Credit to Fermin Serna of the Google Security Team.
- Medium CVE-2012-5122: Bad cast in input handling. Credit to Google
Chrome Security Team (Inferno).
- Medium CVE-2012-5123: Out-of-bounds reads in Skia. Credit to
Google Chrome Security Team (Inferno).
- High CVE-2012-5124: Memory corruption in texture handling. Credit to
Al Patrick of the Chromium development community.
- Medium CVE-2012-5125: Use-after-free in extension tab handling.
Credit to Alexander Potapenko of the Chromium development community.
- Medium CVE-2012-5126: Use-after-free in plug-in placeholder handling.
Credit to Google Chrome Security Team (Inferno).
- High CVE-2012-5128: Bad write in v8. Credit to Google Chrome Security
Team (Cris Neckar).
* [574d76c] Override the lintian flag:
embedded-library usr/lib/chromium/libffmpegsumo.so: libavcodec
* [3105012] Updated changelog
* [ac9c032] Use explicit library dependencies instead of dlopen
* [1ad217c] Fixed CHANNELS_URL
* [7c2d359] Drop SCM revision from the version
* [ca31c0c] Install all chromium libs
* [167aea7] Use internal copy of libpng. This is necessary because with
system libpng render process is consuming 100% CPU
(see http://code.google.com/p/chromium/issues/detail?id=174603)
* [8742d82] debian/patches/pulse_ftbfs.patch: Fix FTBFS
* [9e76ec7] Refreshed patches
* [1c6f4c3] Use Debian api key
* [cdf5c74] Refreshed patches
* [ad9480c] Remove useless embedded copy of documentation from source
containing non DFSG-compliant material:
- src/native_client/toolchain/linux_x86/info
- src/native_client/toolchain/linux_x86/man
- src/native_client/toolchain/linux_x86/share/info
- src/native_client/toolchain/linux_x86/x86_64-nacl/share/info
- src/native_client/toolchain/linux_x86_newlib/info
- src/native_client/toolchain/linux_x86_newlib/man
- src/native_client/toolchain/linux_x86_newlib/share/info
(Closes: #695703)
* [31ea388] Fixed Homepage field.
Thanks to Dmitry Shachnev (Closes: #686561)
* [d509e07] Override the lintian flag: embedded-library
usr/lib/chromium/chromium: libpng
Checksums-Sha1:
78c4e9968beaa75b8cefb6c08dd5951046835f9b 2990
chromium-browser_24.0.1312.68-1.dsc
77c08a7cb023ed34041b7af419c3c07888f7f06d 623055032
chromium-browser_24.0.1312.68.orig.tar.xz
a779ddcf33b0b3d1efbe0cd66d6678fbc199b8df 254934
chromium-browser_24.0.1312.68-1.debian.tar.gz
4de09f59bc8b100037a304bb0acd99cf30376efa 158954
chromium-browser_24.0.1312.68-1_all.deb
06118bed7a0f10b8cbbdcb5586f35bcfa1361c28 158274
chromium-browser-dbg_24.0.1312.68-1_all.deb
7270b89bd17b8588c4d91cb5f4bf22972685bca3 158402
chromium-browser-l10n_24.0.1312.68-1_all.deb
8298d39fdf7322cea90b39fae83f22360abbabe1 158308
chromium-browser-inspector_24.0.1312.68-1_all.deb
d935a1737dc58ec6f54f166038f58204de97538c 2525704
chromium-l10n_24.0.1312.68-1_all.deb
b674a13e398c35cf33dea3db6f0052c60318ea61 788532
chromium-inspector_24.0.1312.68-1_all.deb
61e76154643fc6f066adaff8a753dc6263bae1a0 37537604
chromium_24.0.1312.68-1_amd64.deb
ae8f34926fa3f8b216ffa1fbaebd5a7b113608e0 397600554
chromium-dbg_24.0.1312.68-1_amd64.deb
Checksums-Sha256:
a2c24f6c79eaa1a32002f44bba43049ac21d0fe0229b9dd9547f9fdcf13177e0 2990
chromium-browser_24.0.1312.68-1.dsc
51064d8cd3c858be45090f90c236612e59bd6d859b99b8cccd0f3657e6a8d560 623055032
chromium-browser_24.0.1312.68.orig.tar.xz
c0f7a54608133102cc3d2c4eda6b3c338899f349d830b17bc578272bd0f73352 254934
chromium-browser_24.0.1312.68-1.debian.tar.gz
a6ce97dad7de474fac7005b14dbca603d596d544eede06336aa8c46a9e544aa7 158954
chromium-browser_24.0.1312.68-1_all.deb
7af693e68d3b98b458297faaf9f7b4298d878098b1fdd96bb23836fa043d315b 158274
chromium-browser-dbg_24.0.1312.68-1_all.deb
5fea5e8c2f920e2746a80f44f66526e51bae839742961af5e6031eccba67df69 158402
chromium-browser-l10n_24.0.1312.68-1_all.deb
9affac21ad3b9448f4f9fbead89d2b46243a986bb421e6627179441a7cb86bde 158308
chromium-browser-inspector_24.0.1312.68-1_all.deb
700d9f0d9388f405a54483412576c2e1ad8c0cb2c6e3c6c0502646f7bcce2a5f 2525704
chromium-l10n_24.0.1312.68-1_all.deb
ea645d37f157a9bfb34ae0406c808d5358d28ffe85bf532debebe47d1f92cac2 788532
chromium-inspector_24.0.1312.68-1_all.deb
04021dbcc84630193aff74d4ba55803841dc4a05eb9144bc98311de6cad6a195 37537604
chromium_24.0.1312.68-1_amd64.deb
6f9a010a064b95e0ef5fdf88c5dfb09944a5eaa9516f06ec9a9032f7b0a564f8 397600554
chromium-dbg_24.0.1312.68-1_amd64.deb
Files:
92575d846e8e9605c43551e1ffc605a6 2990 web optional
chromium-browser_24.0.1312.68-1.dsc
28f915793d464a775e21eb5494bed8d0 623055032 web optional
chromium-browser_24.0.1312.68.orig.tar.xz
059f0a18dd4879091823025b980e2c6f 254934 web optional
chromium-browser_24.0.1312.68-1.debian.tar.gz
fe681a88923bd8d47e4cce4ac1ea9e69 158954 oldlibs optional
chromium-browser_24.0.1312.68-1_all.deb
7081f7ed56e4b5b1f8a68fdda89211cc 158274 oldlibs extra
chromium-browser-dbg_24.0.1312.68-1_all.deb
35343a81f9778597026fa9916b52b94c 158402 oldlibs optional
chromium-browser-l10n_24.0.1312.68-1_all.deb
93c6a489be484109ee3700f4c9909195 158308 oldlibs optional
chromium-browser-inspector_24.0.1312.68-1_all.deb
564c1b838c37b1b6e7ca43e165a4e32f 2525704 web optional
chromium-l10n_24.0.1312.68-1_all.deb
80f23303b99eb7b0bc31a12d15a1c90d 788532 web optional
chromium-inspector_24.0.1312.68-1_all.deb
87948706eb50cda0f5fdf80ae3de7566 37537604 web optional
chromium_24.0.1312.68-1_amd64.deb
3526d93ee8260e5d570da10c9c72a6af 397600554 debug extra
chromium-dbg_24.0.1312.68-1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iEYEARECAAYFAlESlcMACgkQNxpp46476aphZwCfThHbUUVkuu3ThRDQ44r25dwH
6DsAn0I5wGwU/JqcXOenSj/dq+Zzvii/
=ghnP
-----END PGP SIGNATURE-----
--- End Message ---