Hello community,

here is the log from the commit of package chromium for openSUSE:Factory 
checked in at 2012-10-09 13:48:02
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/chromium (Old)
 and      /work/SRC/openSUSE:Factory/.chromium.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "chromium", Maintainer is "prus...@suse.com"

Changes:
--------
--- /work/SRC/openSUSE:Factory/chromium/chromium.changes        2012-09-25 
09:31:58.000000000 +0200
+++ /work/SRC/openSUSE:Factory/.chromium.new/chromium.changes   2012-10-09 
13:54:59.000000000 +0200
@@ -1,0 +2,34 @@
+Sun Oct  7 11:28:56 UTC 2012 - tittiatc...@gmail.com
+
+- Update to 24.0.1290
+  * No further indications in the ChangeLog.
+
+-------------------------------------------------------------------
+Sun Sep 30 09:38:06 UTC 2012 - tittiatc...@gmail.com
+
+- Update to 24.0.1283
+  * Security Fixes (bnc#782257)
+    - High CVE-2012-2889: UXSS in frame handling
+    - High CVE-2012-2886: UXSS in v8 bindings.
+    - High CVE-2012-2881: DOM tree corruption with plug-ins.
+    - High CVE-2012-2876: Buffer overflow in SSE2 optimizations.
+    - High CVE-2012-2883: Out-of-bounds write in Skia.
+    - High CVE-2012-2887: Use-after-free in onclick handling.
+    - High CVE-2012-2888: Use-after-free in SVG text references.
+    - High CVE-2012-2894: Crash in graphics context handling.
+    - High CVE-2012-2896: Integer overflow in WebGL. 
+    - Medium CVE-2012-2877: Browser crash with extensions 
+       and modal dialogs
+    - Low CVE-2012-2879: DOM topology corruption.
+    - Medium CVE-2012-2884: Out-of-bounds read in Skia.
+    - High CVE-2012-2874: Out-of-bounds write in Skia.
+    - High CVE-2012-2878: Use-after-free in plug-in handling.
+    - Medium CVE-2012-2880: Race condition in plug-in paint buffer.
+    - High CVE-2012-2882: Wild pointer in OGG container handling.
+    - Medium CVE-2012-2885: Possible double free on exit.
+    - Low CVE-2012-2891: Address leak over IPC.
+    - Low CVE-2012-2892: Pop-up block bypass.
+    - High CVE-2012-2893: Double free in XSL transforms. 
+
+
+-------------------------------------------------------------------

Old:
----
  chromium.23.0.1269.0.svn157053.tar.bz2

New:
----
  chromium.24.0.1290.0.svn160607.tar.bz2

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ chromium.spec ++++++
--- /var/tmp/diff_new_pack.2lkFIF/_old  2012-10-09 13:55:15.000000000 +0200
+++ /var/tmp/diff_new_pack.2lkFIF/_new  2012-10-09 13:55:15.000000000 +0200
@@ -16,10 +16,10 @@
 #
 
 
-%define svn_revision 157053
+%define svn_revision 160607
 
 Name:           chromium
-Version:        23.0.1269.0
+Version:        24.0.1290.0
 Release:        0
 Summary:        Google's opens source browser project
 License:        BSD-3-Clause and LGPL-2.1+


++++++ chromium.23.0.1269.0.svn157053.tar.bz2 -> 
chromium.24.0.1290.0.svn160607.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/chromium/chromium.23.0.1269.0.svn157053.tar.bz2 
/work/SRC/openSUSE:Factory/.chromium.new/chromium.24.0.1290.0.svn160607.tar.bz2 
differ: char 11, line 1

-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to