-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Thu, 03 Dec 2015 00:59:47 +0000 Source: chromium-browser Binary: chromium chromium-dbg chromium-l10n chromedriver Architecture: source Version: 47.0.2526.73-1 Distribution: unstable Urgency: medium Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org> Changed-By: Michael Gilbert <mgilbert@debian.org> Description: chromedriver - web browser - WebDriver support chromium - web browser chromium-dbg - web browser - debugging symbols chromium-l10n - web browser - language packs Closes: 781940 793815 Changes: chromium-browser (47.0.2526.73-1) unstable; urgency=medium . * New upstream stable release: - CVE-2015-1302: Information leak in PDF viewer. Credit to Rob Wu. - CVE-2015-6765: Use-after-free in AppCache. Credit to anonymous. - CVE-2015-6766: Use-after-free in AppCache. Credit to anonymous. - CVE-2015-6767: Use-after-free in AppCache. Credit to anonymous. - CVE-2015-6768: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. - CVE-2015-6769: Cross-origin bypass in core. Credit to Mariusz Mlynski. - CVE-2015-6770: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. - CVE-2015-6771: Out of bounds access in v8. Credit to anonymous. - CVE-2015-6772: Cross-origin bypass in DOM. Credit to Mariusz Mlynski. - CVE-2015-6764: Out of bounds access in v8. Credit to Guang Gong. - CVE-2015-6773: Out of bounds access in Skia. Credit to cloudfuzzer. - CVE-2015-6774: Use-after-free in Extensions. Credit to anonymous. - CVE-2015-6775: Type confusion in PDFium. Credit to Atte Kettunen. - CVE-2015-6776: Out of bounds access in PDFium. Credit to Hanno Böck. - CVE-2015-6777: Use-after-free in DOM. Credit to Long Liu. - CVE-2015-6778: Out of bounds access in PDFium. Credit to Karl Skomski. - CVE-2015-6779: Scheme bypass in PDFium. Credit to Til Jasper Ullrich. - CVE-2015-6780: Use-after-free in Infobars. Credit to Khalil Zhani. - CVE-2015-6781: Integer overflow in Sfntly. Credit to miaubiz. - CVE-2015-6782: Content spoofing in Omnibox. Credit to Luan Herrera. - CVE-2015-6784: Escaping issue in saved pages. Credit to Inti De Ceukelaire. - CVE-2015-6785: Wildcard matching issue in CSP. Credit to Michael Ficarra. - CVE-2015-6786: Scheme bypass in CSP. Credit to Michael Ficarra. * Lengthen GPU timeout (closes: #781940). * Enable accelerated video decoding (closes: #793815). Checksums-Sha1: 75681b926226d8ccd3c606a0bd3bf1701307cfcb 3970 chromium-browser_47.0.2526.73-1.dsc 29ebf7f5e92435be3debe63529d47b6b9b12a9c9 394400368 chromium-browser_47.0.2526.73.orig.tar.xz 8d9d3fe9adae6b5f202cf27e9fa26767cdeeeb6d 116884 chromium-browser_47.0.2526.73-1.debian.tar.xz Checksums-Sha256: 1d1052873b502e654a3571e876d65c6551e75352039e0f4163f37203d561c1b8 3970 chromium-browser_47.0.2526.73-1.dsc 1a2dc013932c237eb55528281f7ccfa7c775b6f1d357d8ad1235e55cf4fa7fbd 394400368 chromium-browser_47.0.2526.73.orig.tar.xz 8e96df93e49b6c20e36fae0410c6a93ef9d1fb1e7b55d1d914011c2dff22ea32 116884 chromium-browser_47.0.2526.73-1.debian.tar.xz Files: cafc508d6b89732b1805dda5a86c7934 3970 web optional chromium-browser_47.0.2526.73-1.dsc b77406555fb4aa7b9331734148580915 394400368 web optional chromium-browser_47.0.2526.73.orig.tar.xz 97ca0d3e6432abafb46148ef83814f47 116884 web optional chromium-browser_47.0.2526.73-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQQcBAEBCgAGBQJWYNVTAAoJELjWss0C1vRzYjcgAJQ0BmsXPn1k0O18g+gsfGMH v4EVTF7nrHWCJqRlWIN8qGyQmI/d2dU7FmaWFKqnxsGEodTBt7bnYQ72Ess1PWSc 7vHTZLSQ7LQD8KztNc4r2nlYCEnYQC6t3H01h/C/mk8AVVPTxigqRl7b2/1gjEHe tUT6/FZbguQYiX9HuhvI1h/XQlmHw+qXDhVtMNkym71twcMyEy/3okkMmOJy4CI7 O7A9tXmwTBfj9COsBgv9DcAkhZ3gdjmHxqqBDM1ZRjla2kXQhP/E8Y+kpYwUIXSt TJOcDP588n1Ver5S3IZNX7ayUTypIRdWViQhBKfFfyQz+idPZ9pdsX5RzZujsMom GNosY0tdA2NMzMqgOXMLj60wf2HwpGduxD+cJmeBPsQ6Kt8MuUfiVjR8tWPzoeCG Bmq06h1fsgVZkCgSdFNN36NluVDIoCC7Nuq5q8D3XRv3shoAKy4Ofu7SPpbtTkh8 /SegOARiwfBXFBqBCclrRENREgflWf4PaApBqHPMp6dCgFACdNHA3+G0+9+fwpJZ BsbBpwzLBwXoWhnL2pYYx5KY/22lBhiyfKndNrDMO3JCDke9DdDSyoFUuTxCnPGo /usmph1th8yj1oIg0q4N13xyE0hRtzU1zbyh06eg+efQA1YI314Q5yrm1MjMiT7B GyVe1KDg6d35x3c7ck9cIMmxJqKwJ1EhM5PNptzVy8jKoT/2fnXQE9XpZacSkR/V iwJatTQz33n/pt1AZcEiNoqoeQGGWNyfIHBxy9g0d9U5hc32FGduC66U/ovJjMe+ wu351eEqE+FEnz7JOmjiEd8RKue1g0knYaJoswcmh3Z0PBozokcl+q7T27El1JwS B2zXFVaIw19e07cFG2fRkji86HV3Kl8v9uIUqcbZ/jmgzz1uFIpbpeZCjME9skg3 TzLGQ0+HkSngrHz/GGjTx2jjepz9rg1NPIp9vMOCgl+Isby/+0wZt++aEHKGjcUc 7UAlV+BImFvvIs/qDUbDjEwpnQjtBBYIKJPxV5Fn9udWvjgpjaVwv1UeVkFs7zem 05AzphzZJl8Z0hip2Ek5uCsj0xiqOiyOHnOzYWZrbAkyQb2sOBDc7dlJmZkYI9jZ 4Guz2YSzmUgxXJu+HBXpWiCdHh476EagY2MiptRGE7YPKYU26kHATJIroyzBYM0M m+JDRtlwuf0NZP8taas8OJdruwE5Mz7eI8d0sxZvtqVhXJNOVJYIc0/YQ/NrQH2e FLTmtAzGQf4Xqndp2wzLhberVbjuEEoU0H4mKSkw8C6En9cinQadzaitLizi/kXa hmPfjWGxls5S2PkCqI8kIi3D0EXM05NXtZtAgtE+QTrjXEFR/y1IEoUw63B3Blc= =6sQG -----END PGP SIGNATURE-----