chromium-browser 11.0.696.65~r84435-1 source package in Debian


chromium-browser (11.0.696.65~r84435-1) unstable; urgency=low
  * New Stable release:   - Fixed password loss (Closes: #619903)   - [61502] High CVE-2011-1303: Stale pointer in floating object handling.     Credit to Scott Hess of the Chromium development community and     Martin Barbella.   - [70538] Low CVE-2011-1304: Pop-up block bypass via plug-ins.     Credit to Chamal De Silva.   - [70589] Medium CVE-2011-1305: Linked-list race in database handling.     Credit to Kostya Serebryany of the Chromium development community.   - [71586] Medium CVE-2011-1434: Lack of thread safety in MIME handling.     Credit to Aki Helin.   - [72523] Medium CVE-2011-1435: Bad extension with ‘tabs’ permission can     capture local files. Credit to Cole Snodgrass.   - [72910] Low CVE-2011-1436: Possible browser crash due to bad interaction     with X. Credit to miaubiz.   - [73526] High CVE-2011-1437: Integer overflows in float rendering.     Credit to miaubiz.   - [74653] High CVE-2011-1438: Same origin policy violation with blobs.     Credit to kuzzcc.   - [74763] High CVE-2011-1439: Prevent interference between renderer     processes. Credit to Julien Tinnes of the Google Security Team.   - [75186] High CVE-2011-1440: Use-after-free with <ruby> tag and CSS.     Credit to Jose A. Vazquez.   - [75347] High CVE-2011-1441: Bad cast with floating select lists.     Credit to Michael Griffiths.   - [75801] High CVE-2011-1442: Corrupt node trees with mutation events.     Credit to Sergey Glazunov and wushi of team 509.   - [76001] High CVE-2011-1443: Stale pointers in layering code.     Credit to Martin Barbella.   - [76542] High CVE-2011-1444: Race condition in sandbox launcher.     Credit to Dan Rosenberg.   - [76646] Medium CVE-2011-1445: Out-of-bounds read in SVG.     Credit to wushi of team509.   - [76666] [77507] [78031] High CVE-2011-1446: Possible URL bar spoofs with     navigation errors and interrupted loads. Credit to kuzzcc.   - [76966] High CVE-2011-1447: Stale pointer in drop-down list handling.     Credit to miaubiz.   - [77130] High CVE-2011-1448: Stale pointer in height calculations.     Credit to wushi of team509.   - [77346] High CVE-2011-1449: Use-after-free in WebSockets.     Credit to Marek Majkowski.   - [77349] Low CVE-2011-1450: Dangling pointers in file dialogs.     Credit to kuzzcc.   - [77463] High CVE-2011-1451: Dangling pointers in DOM id map.     Credit to Sergey Glazunov.   - [77786] Medium CVE-2011-1452: URL bar spoof with redirect and manual     reload. Credit to Jordi Chancel.   - [79199] High CVE-2011-1454: Use-after-free in DOM id handling.     Credit to Sergey Glazunov.  * Updated patches  * Use libv8 system copy  * Fixed FTBFS (converting to non-pointer type from NULL)  * Addeed libpam0g-dev in Build-Depends  * Fixed FTBFS with gcc 4.6 (closes: 624814)  * Do not use the to use the experimental gold linker, it causes FTBFS  * Added in install excluded files: genmacro genmodule genperf genstring    genversion re2c yasm -- Giuseppe Iuculano <email address hidden>  Sat, 14 May 2011 15:22:23 +0200

Upload details

Uploaded by:
Debian Chromium Maintainers
Uploaded to:
Original maintainer:
Debian Chromium Maintainers
all i386 amd64 armel
Low Urgency

See full publishing history Publishing

Series Pocket Published Component Section



File Size SHA-256 Checksum
chromium-browser_11.0.696.65~r84435-1.dsc 2.4 KiB 5d57482c2336a65a2ff501bc1ac16866ba1a3913dde4bfd416e597c76e2e8af4
chromium-browser_11.0.696.65~r84435.orig.tar.bz2 225.1 MiB afb6c98106ff18521bc5ad462c607b3028da9b9200f80f8b679c01bf22b79733
chromium-browser_11.0.696.65~r84435-1.debian.tar.gz 231.2 KiB ee4da27eef4950a4343b73f822d49000ca70eb46bd4abf544f6cf12926326753

No changes file available.

Binary packages built by this source