chromium-browser (31.0.1650.63-0ubuntu1~20131204.1) trusty; urgency=low

  * Release to stage at ppa:canonical-chromium-builds/stage

chromium-browser (31.0.1650.63-0ubuntu1) trusty; urgency=low

  * New release 31.0.1650.63:
    - CVE-2013-6634: Session fixation in sync related to 302 redirects.
    - CVE-2013-6635: Use-after-free in editing.
    - CVE-2013-6636: Address bar spoofing related to modal dialogs.
    - CVE-2013-6637: Various fixes from internal audits, fuzzing and other
      initiatives.
    - CVE-2013-6638: Buffer overflow in v8. This issue was fixed in v8 version
      3.22.24.7.
    - CVE-2013-6639: Out of bounds write in v8. This issue was fixed in v8
      version 3.22.24.7.
    - CVE-2013-6640: Out of bounds read in v8. This issue was fixed in v8
      version 3.22.24.7.

chromium-browser (31.0.1650.57-0ubuntu3) trusty; urgency=low

  * debian/control: Drop libnss version number in Depends. We only need to
    recompile. (LP: #1251454)

chromium-browser (31.0.1650.57-0ubuntu2) trusty; urgency=low

  * debian/apport/chromium-browser.py: Include dmesg events mentioning chromium
    in apport reports.
  * debian/control: Abandon nss transitional package as Dependency, and add
    real package with epoch version number.

chromium-browser (31.0.1650.57-0ubuntu1) trusty; urgency=low

  * New release 31.0.1650.57:
    - CVE-2013-6632: Multiple memory corruption issues.
  * New release 31.0.1650.48:  (LP: #1250579)
    - CVE-2013-6621: Use after free related to speech input elements.
    - CVE-2013-6622: Use after free related to media elements.
    - CVE-2013-6623: Out of bounds read in SVG.
    - CVE-2013-6624: Use after free related to "id" attribute strings.
    - CVE-2013-6625: Use after free in DOM ranges.
    - CVE-2013-6626: Address bar spoofing related to interstitial warnings.
    - CVE-2013-6627: Out of bounds read in HTTP parsing.
    - CVE-2013-6628: Issue with certificates not being checked during TLS
      renegotiation.
    - CVE-2013-2931: Various fixes from internal audits, fuzzing and other
      initiatives.
    - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo.
    - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.
    - CVE-2013-6631: Use after free in libjingle.
  * debian/chromium-chromedriver.install: Drop unsupported, broken old
    chromedriver v1 and add chromedriver2.
  * Update webapps patches.
  * Disable chromedriver testing until the new server-test client dependencies
    are figured out.
  * Drop base_unittests and automated_ui_tests build and automatic test and
    from installation exclusion.
  * Include wildcat package 'pepflashplugin-nonfree' in apport reportting.

chromium-browser (30.0.1599.114-0ubuntu1) trusty; urgency=low

  * debian/patches/menu-bar-visible.patch: Don't treat object as object
    reference.
  * debian/patches/4-chromeless-window-launch-option.patch: Don't fix problem
    introduced in menu-bar-visible patch.
  * debian/rules: Fix typo of Precise conditional.
  * Test the compiler for "-m32" support as the canonical test of support.
    Only a problem on ARM.
  * debian/patches/cr30-sandbox-async-signal-safe.patch: Backport to make
    SIGSYS handler in sandbox safe and never call itself. (LP: #1195797)
  * debian/rules, debian/control: Use standard hardening flags, not
    hardening-wrapper.
  * debian/control: Build-depend on binutils, which already includes gold
    linker.
  * debian/control: Drop some unused build-deps: autotools-dev, binutils,
       flex, g++-multilib [amd64], libbz2-dev, libc6-dev-i386 [amd64],
       libdbus-glib-1-dev, libgl1-mesa-dev, libgl1-mesa-dri, libglib2.0-dev,
       libglu1-mesa-dev, libhunspell-dev, libjpeg-dev, libnspr4-dev,
       libpam0g-dev, libpango1.0-dev, libspeechd-dev, libssl-dev, libxi-dev,
       libxml2-dev, libxslt1-dev, libxt-dev, mesa-common-dev,
       patchutils (>= 0.2.25), python-simplejson, yasm zlib1g-dev,
  * debian/patches/cr31-pango-tab-titles.patch: Backport a fix that makes
    tab titles disappear due to a pango bug.
  * debian/tests/control: Drop Depends on obselete package
    libunity-webapps-chromium.

Date: Mon, 09 Dec 2013 21:42:54 -0500
Changed-By: Chad MILLER <chad.mil...@canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Signed-By: Chris Coulson <chris.coul...@canonical.com>
https://launchpad.net/ubuntu/trusty/+source/chromium-browser/31.0.1650.63-0ubuntu1~20131204.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 09 Dec 2013 21:42:54 -0500
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n 
chromium-codecs-ffmpeg chromium-codecs-ffmpeg-dbg chromium-codecs-ffmpeg-extra 
chromium-codecs-ffmpeg-extra-dbg chromium-chromedriver chromium-chromedriver-dbg
Architecture: source
Version: 31.0.1650.63-0ubuntu1~20131204.1
Distribution: trusty
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-disc...@lists.ubuntu.com>
Changed-By: Chad MILLER <chad.mil...@canonical.com>
Description: 
 chromium-browser - Chromium browser
 chromium-browser-dbg - chromium-browser debug symbols
 chromium-browser-l10n - chromium-browser language packages
 chromium-chromedriver - WebDriver driver for the Chromium Browser
 chromium-chromedriver-dbg - chromium-chromedriver debug symbols
 chromium-codecs-ffmpeg - Free ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-dbg - chromium-codecs-ffmpeg debug symbols
 chromium-codecs-ffmpeg-extra - Extra ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-extra-dbg - chromium-codecs-ffmpeg-extra debug symbols
Launchpad-Bugs-Fixed: 1195797 1250579 1251454
Changes: 
 chromium-browser (31.0.1650.63-0ubuntu1~20131204.1) trusty; urgency=low
 .
   * Release to stage at ppa:canonical-chromium-builds/stage
 .
 chromium-browser (31.0.1650.63-0ubuntu1) trusty; urgency=low
 .
   * New release 31.0.1650.63:
     - CVE-2013-6634: Session fixation in sync related to 302 redirects.
     - CVE-2013-6635: Use-after-free in editing.
     - CVE-2013-6636: Address bar spoofing related to modal dialogs.
     - CVE-2013-6637: Various fixes from internal audits, fuzzing and other
       initiatives.
     - CVE-2013-6638: Buffer overflow in v8. This issue was fixed in v8 version
       3.22.24.7.
     - CVE-2013-6639: Out of bounds write in v8. This issue was fixed in v8
       version 3.22.24.7.
     - CVE-2013-6640: Out of bounds read in v8. This issue was fixed in v8
       version 3.22.24.7.
 .
 chromium-browser (31.0.1650.57-0ubuntu3) trusty; urgency=low
 .
   * debian/control: Drop libnss version number in Depends. We only need to
     recompile. (LP: #1251454)
 .
 chromium-browser (31.0.1650.57-0ubuntu2) trusty; urgency=low
 .
   * debian/apport/chromium-browser.py: Include dmesg events mentioning chromium
     in apport reports.
   * debian/control: Abandon nss transitional package as Dependency, and add
     real package with epoch version number.
 .
 chromium-browser (31.0.1650.57-0ubuntu1) trusty; urgency=low
 .
   * New release 31.0.1650.57:
     - CVE-2013-6632: Multiple memory corruption issues.
   * New release 31.0.1650.48:  (LP: #1250579)
     - CVE-2013-6621: Use after free related to speech input elements.
     - CVE-2013-6622: Use after free related to media elements.
     - CVE-2013-6623: Out of bounds read in SVG.
     - CVE-2013-6624: Use after free related to "id" attribute strings.
     - CVE-2013-6625: Use after free in DOM ranges.
     - CVE-2013-6626: Address bar spoofing related to interstitial warnings.
     - CVE-2013-6627: Out of bounds read in HTTP parsing.
     - CVE-2013-6628: Issue with certificates not being checked during TLS
       renegotiation.
     - CVE-2013-2931: Various fixes from internal audits, fuzzing and other
       initiatives.
     - CVE-2013-6629: Read of uninitialized memory in libjpeg and libjpeg-turbo.
     - CVE-2013-6630: Read of uninitialized memory in libjpeg-turbo.
     - CVE-2013-6631: Use after free in libjingle.
   * debian/chromium-chromedriver.install: Drop unsupported, broken old
     chromedriver v1 and add chromedriver2.
   * Update webapps patches.
   * Disable chromedriver testing until the new server-test client dependencies
     are figured out.
   * Drop base_unittests and automated_ui_tests build and automatic test and
     from installation exclusion.
   * Include wildcat package 'pepflashplugin-nonfree' in apport reportting.
 .
 chromium-browser (30.0.1599.114-0ubuntu1) trusty; urgency=low
 .
   * debian/patches/menu-bar-visible.patch: Don't treat object as object
     reference.
   * debian/patches/4-chromeless-window-launch-option.patch: Don't fix problem
     introduced in menu-bar-visible patch.
   * debian/rules: Fix typo of Precise conditional.
   * Test the compiler for "-m32" support as the canonical test of support.
     Only a problem on ARM.
   * debian/patches/cr30-sandbox-async-signal-safe.patch: Backport to make
     SIGSYS handler in sandbox safe and never call itself. (LP: #1195797)
   * debian/rules, debian/control: Use standard hardening flags, not
     hardening-wrapper.
   * debian/control: Build-depend on binutils, which already includes gold
     linker.
   * debian/control: Drop some unused build-deps: autotools-dev, binutils,
        flex, g++-multilib [amd64], libbz2-dev, libc6-dev-i386 [amd64],
        libdbus-glib-1-dev, libgl1-mesa-dev, libgl1-mesa-dri, libglib2.0-dev,
        libglu1-mesa-dev, libhunspell-dev, libjpeg-dev, libnspr4-dev,
        libpam0g-dev, libpango1.0-dev, libspeechd-dev, libssl-dev, libxi-dev,
        libxml2-dev, libxslt1-dev, libxt-dev, mesa-common-dev,
        patchutils (>= 0.2.25), python-simplejson, yasm zlib1g-dev,
   * debian/patches/cr31-pango-tab-titles.patch: Backport a fix that makes
     tab titles disappear due to a pango bug.
   * debian/tests/control: Drop Depends on obselete package
     libunity-webapps-chromium.
Checksums-Sha1: 
 a20a34f001f3eee2dbdba2e952e86068902f7e95 2643 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.dsc
 46367f0e9844de0d51948ea72d7745d62db5e13f 183587684 
chromium-browser_31.0.1650.63.orig.tar.xz
 b0253063f3e47642da315ca51e36f6df168159de 269562 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.debian.tar.gz
Checksums-Sha256: 
 beb7c7ec027a41630f1eec7d34f48100872f3b206482ff0efe2963bd3a21335c 2643 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.dsc
 3a42f4c79294b1750af02bd191766e5f72741d723d2c25c893dee12b2729fd89 183587684 
chromium-browser_31.0.1650.63.orig.tar.xz
 eb681fadb8aa726f20cc05492a564e65c008ac98485210741789a562a70782e5 269562 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.debian.tar.gz
Files: 
 a81fa0a262a43d7856b444c5a6adf071 2643 web optional 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.dsc
 586b5b26397a0cfdc26092d9008c8108 183587684 web optional 
chromium-browser_31.0.1650.63.orig.tar.xz
 69e4100729f27615afcbfdb8be46f987 269562 web optional 
chromium-browser_31.0.1650.63-0ubuntu1~20131204.1.debian.tar.gz
Original-Maintainer: Micah Gersten <mic...@ubuntu.com>, Fabien Tassin 
<f...@ubuntu.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (GNU/Linux)

iQEcBAEBAgAGBQJSp2TGAAoJEGEfvezVlG4P6iQH/Rz5yFJ5a+QbwPmZCXBZn0E1
dxz8JwPCmm1XOb3tgsJdBV4yIySb6Iqk7Lxnq9JvKKn2Y+3DZVjgAh9LR27YFfaD
HhR9Ix2TlCdTLZkPuQWxQ7H/J6TBD649TQFG8BF7DGsUtLySGJbcwEnDzAphPqw/
3OC9SUH33vVxLdR6xUg9FUPs4ChWyw5T3ZJOPgGyJCoT+7aGessVs4II4G5iiRHf
vynSSXwtxv3koYnT6A1XKTWrw1wR+OX5mvRStqTEY5oeXHZ19m6LMld/vQJhDWZX
igB8lqFwY8msStgQ//EM7c5RCaGd212w9DeKBlAyRpxcXrfVQS6v18KUPSmmN2U=
=hXVD
-----END PGP SIGNATURE-----
-- 
Trusty-changes mailing list
Trusty-changes@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/trusty-changes

Reply via email to