-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Fri, 02 Dec 2016 02:06:59 +0000 Source: chromium-browser Binary: chromium chromium-l10n chromedriver Architecture: source Version: 55.0.2883.75-1 Distribution: unstable Urgency: medium Maintainer: Debian Chromium Maintainers <pkg-chromium-maint@lists.alioth.debian.org> Changed-By: Michael Gilbert <mgilbert@debian.org> Description: chromedriver - web browser - WebDriver support chromium - web browser chromium-l10n - web browser - language packs Closes: 845785 Changes: chromium-browser (55.0.2883.75-1) unstable; urgency=medium . * New upstream stable release: - CVE-2016-9651: Private property access in V8. Credit to Guang Gong - CVE-2016-5208: Universal XSS in Blink. Credit to Mariusz Mlynski - CVE-2016-5207: Universal XSS in Blink. Credit to Mariusz Mlynski - CVE-2016-5206: Same-origin bypass in PDFium. Credit to Rob Wu - CVE-2016-5205: Universal XSS in Blink. Credit to Anonymous - CVE-2016-5204: Universal XSS in Blink. Credit to Mariusz Mlynski - CVE-2016-5209: Out of bounds write in Blink. Credit to Giwan Go - CVE-2016-5203: Use after free in PDFium. Credit to Anonymous - CVE-2016-5210: Out of bounds write in PDFium. Credit to Ke Liu - CVE-2016-5212: Local file disclosure in DevTools. Credit to Khalil Zhani - CVE-2016-5211: Use after free in PDFium. Credit to Anonymous - CVE-2016-5213: Use after free in V8. Credit to Khalil Zhani - CVE-2016-5214: File download protection bypass. Credit to Jonathan Birch and MSVR - CVE-2016-5216: Use after free in PDFium. Credit to Anonymous - CVE-2016-5215: Use after free in Webaudio. Credit to Looben Yang - CVE-2016-5217: Use of unvalidated data in PDFium. Credit to Rob Wu - CVE-2016-5218: Address spoofing in Omnibox. Credit to Abdulrahman Alqabandi - CVE-2016-5219: Use after free in V8. Credit to Rob Wu - CVE-2016-5221: Integer overflow in ANGLE. Credit to Tim Becker - CVE-2016-5220: Local file access in PDFium. Credit to Rob Wu - CVE-2016-5222: Address spoofing in Omnibox. Credit to xisigr - CVE-2016-9650: CSP Referrer disclosure. Credit to Jakub Żoczek - CVE-2016-5223: Integer overflow in PDFium. Credit to Hwiwon Lee - CVE-2016-5226: Limited XSS in Blink. Credit to Jun Kokatsu - CVE-2016-5225: CSP bypass in Blink. Credit to Scott Helme - CVE-2016-5224: Same-origin bypass in SVG. Credit to Roeland Krak - CVE-2016-9652: Various fixes from internal audits, fuzzing and other initiatives * Make it possible to pass build flags into gn (closes: #845785). Checksums-Sha1: 2860537b005b6bdc31a7d4cdc018b97e8745828c 3990 chromium-browser_55.0.2883.75-1.dsc 7e19210a25ae94e17b0fd93625642d1d59697dc8 472986664 chromium-browser_55.0.2883.75.orig.tar.xz 4b4b1ce841dedcdd7ff8fff4242ae2df05b4eb4c 114268 chromium-browser_55.0.2883.75-1.debian.tar.xz Checksums-Sha256: 12953e90fc00200f678b2ee6915e70d5524952d98042d57037d2a98dfe4bf9d1 3990 chromium-browser_55.0.2883.75-1.dsc 8b4a7109aeb40f1804d584151649a6b2ca70d0da459fe86daeaa0f5f3c6ea358 472986664 chromium-browser_55.0.2883.75.orig.tar.xz 2476b5583ec983fc8ac63e3cfe62deba9c75d9786ac0ff7d25a2fecb58645688 114268 chromium-browser_55.0.2883.75-1.debian.tar.xz Files: 88eb70a38bb1103f141b95012e1fb856 3990 web optional chromium-browser_55.0.2883.75-1.dsc 6ea097ad1d73444f40359f54ad9bf396 472986664 web optional chromium-browser_55.0.2883.75.orig.tar.xz e9f93b1966aca686e9fc77a040c5cce6 114268 web optional chromium-browser_55.0.2883.75-1.debian.tar.xz -----BEGIN PGP SIGNATURE----- iQQzBAEBCgAdFiEEluhy7ASCBulP9FUWuNayzQLW9HMFAlhBf2EACgkQuNayzQLW 9HN2aB/+I48tAl39OnS4twaeRGnf62QSwiMtQaApNaCV5+I2BiMAPDIiKvZnv2+S AqLcW8ipuWFggCVjqOCe4zidM32n9tvow1feTpbiieTnx4N9fsFVRNz0/rBWpszH pyd+ZsF3hGy05DOnJ6n8sojBSgLZCKb2o3pOi4IWoygghXvjQ1/HxYxO9DY17Kap qda0/A0k79DCRs6D9GrsntD+tFSddy4kp9JI40eSQR/LJ5JUqp5haB0oIzhCACPZ SEQq0bPlbMn/DKOKoYLGARIY+4DRteP6/4scXGbAlcCRhJb09u7kR140RklSqcjW XrbNtq+udJ/2kcWHtoLtsgr2JoJm6EYtqwdyFIwhmzZ1hRmb9cgYm16M4PGJfMRn hNRPjS2rLZY9z1TdWEC8WWr7SL9iqCHHCc8nLwN3MiEWr1mCP3gpHzLwY6/XVV3z ppV7YqA31ArU+04KDA9untfS/R+GLbIPwiS16XaHlHR4NmhVQrJsPw7wVInSIFH8 EMJSc0UfuS36p1G2J5CQODcip27OIk4XuQTYgI/KyDg4mKRD8EuJt6OaZjqTMUDC SH1AUUj2RoLr0E/iNYkT5tVFaEndkymkUG0dV8mpJWvWnZPPyea/H/MZUINj2rdX 4WlHEdk0vkU0MGX4qHNXOKlDofL7wmUDgENC1bsKmBDZJ/V69pkfhZjLxtXyYa3p RhfoG8Ld4EMtTtiVnEGm5mNKveLGsOc/1RuY+5bn3XEEvyV6yzsBZs4pYd2+Y9V5 15nOzzIHUsNrmrlJiotCLFANUSCVX/Cum0jhlKFAga2zptp2JNOj2i/B7BazvEE3 gpgIY+tYFFXdSdiYNio4npUGxYb1Z5h8wsz5EDasJQNI7lcSYHA2tTp09o7nr7gK dBcuKG1FTxgwwF8kCJMlMpczHLdKSrMEL0zu2c9vAjbGd/M74uTdeTfSg+eL76SU mlp+U6fjQpg3Wu8OF6wjvB13uVGfBUm3YM8CYvu+rNS7LviVYjqzyH7pWtoDAlWY rWq5Cu6mr5IrND9PtFEwJBgxOz775Xd/tj48YCHdVSFKmB4k+AbUPjIk9SUXTKBx GjpTaoe99IQ/QnkAojaYp0Q6zsqltpc2hIWyBEU0B0wuPRkKsRjDaPhQaQ1QDBmj MlU44il45kSMzdFMRNCu6hoVyQVmhDS8pQ9+NJIsYoG9ShVwMg3Sb9KCnTMJ8WZF NDeNlp2OmEqZZabG8CInnZ2WJnb+xWa/sksLwVJ8vbF6FnKIT5Q8WRpQA+Ji3Ic0 swGI8osrPmAxOGUPsgf3dJTDuIe0rKss2xOSQiCyQ9xe/bZYDlZwPNGX03L8IHpF sQcqN+fgazKTMNcjvlBt68QSZamd7A== =2f0l -----END PGP SIGNATURE-----