[ubuntu/precise] chromium-browser 16.0.912.77~r118311-0ubuntu1 (Accepted)

Micah Gersten micahg at ubuntu.com
Mon Jan 30 20:46:39 UTC 2012


chromium-browser (16.0.912.77~r118311-0ubuntu1) precise; urgency=low

  * New upstream release from the Stable Channel (LP: #923602, #897389)
    (LP: #914648, #889711)
    This release fixes the following security issues:
    - [106484] High CVE-2011-3924: Use-after-free in DOM selections. Credit to
      Arthur Gerkis.
    - [107182] Critical CVE-2011-3925: Use-after-free in Safe Browsing
      navigation. Credit to Chamal de Silva.
    - [108461] High CVE-2011-3928: Use-after-free in DOM handling. Credit to
      wushi of team509 reported through ZDI (ZDI-CAN-1415).
    - [108605] High CVE-2011-3927: Uninitialized value in Skia. Credit to
      miaubiz.
    - [109556] High CVE-2011-3926: Heap-buffer-overflow in tree builder.
      Credit to Arthur Gerkis.

    This upload also includes the following security fixes from 16.0.912.75:
    - [106672] High CVE-2011-3921: Use-after-free in animation frames. Credit to
      Boris Zbarsky of Mozilla.
    - [107128] High CVE-2011-3919: Heap-buffer-overflow in libxml. Credit to
      Jüri Aedla.
    - [108006] High CVE-2011-3922: Stack-buffer-overflow in glyph handling.
      Credit to Google Chrome Security Team (Cris Neckar).

    This upload also includes the following security fixes from 16.0.912.63:
    - [81753] Medium CVE-2011-3903: Out-of-bounds read in regex matching. Credit
      to David Holloway of the Chromium development community.
    - [95465] Low CVE-2011-3905: Out-of-bounds reads in libxml. Credit to Google
      Chrome Security Team (Inferno).
    - [98809] Medium CVE-2011-3906: Out-of-bounds read in PDF parser. Credit to
      Aki Helin of OUSPG.
    - [99016] High CVE-2011-3907: URL bar spoofing with view-source. Credit to
      Luka Treiber of ACROS Security.
    - [100863] Low CVE-2011-3908: Out-of-bounds read in SVG parsing. Credit to
      Aki Helin of OUSPG.
    - [101010] Medium CVE-2011-3909: [64-bit only] Memory corruption in CSS
      property array. Credit to Google Chrome Security Team (scarybeasts) and
      Chu.
    - [101494] Medium CVE-2011-3910: Out-of-bounds read in YUV video frame
      handling. Credit to Google Chrome Security Team (Cris Neckar).
    - [101779] Medium CVE-2011-3911: Out-of-bounds read in PDF. Credit to Google
      Chrome Security Team (scarybeasts) and Robert Swiecki of the Google
      Security Team.
    - [102359] High CVE-2011-3912: Use-after-free in SVG filters. Credit to
      Arthur Gerkis.
    - [103921] High CVE-2011-3913: Use-after-free in Range handling. Credit to
      Arthur Gerkis.
    - [104011] High CVE-2011-3914: Out-of-bounds write in v8 i18n handling.
      Credit to Sławomir Błażek.
    - [104529] High CVE-2011-3915: Buffer overflow in PDF font handling. Credit
      to Atte Kettunen of OUSPG.
    - [104959] Medium CVE-2011-3916: Out-of-bounds reads in PDF cross
      references. Credit to Atte Kettunen of OUSPG.
    - [105162] Medium CVE-2011-3917: Stack-buffer-overflow in FileWatcher.
      Credit to Google Chrome Security Team (Marty Barbella).

    This upload also includes the following fixes from 15.0.874.121:
    - fix to a regression: SVG in iframe doesn't use specified dimensions
    - [103259] High CVE-2011-3900: Out-of-bounds write in v8. Credit to
      Christian Holler

  [ Micah Gersten <micahg at ubuntu.com> ]
  * Add patch to build with glib 2.31 (single entry header inclusion)
    - add debian/patches/glib-header-single-entry.patch
    - update debian/patches/series

  [ Brandon Snider <brandonsnider at ubuntu.com> ]
  * Refresh user agent patch
    - update debian/patches/chromium_useragent.patch.in

Date: Mon, 30 Jan 2012 14:43:06 -0600
Changed-By: Micah Gersten <micahg at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/precise/+source/chromium-browser/16.0.912.77~r118311-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 30 Jan 2012 14:43:06 -0600
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-codecs-ffmpeg chromium-codecs-ffmpeg-dbg chromium-codecs-ffmpeg-extra chromium-codecs-ffmpeg-extra-dbg
Architecture: source
Version: 16.0.912.77~r118311-0ubuntu1
Distribution: precise
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Micah Gersten <micahg at ubuntu.com>
Description: 
 chromium-browser - Chromium browser
 chromium-browser-dbg - chromium-browser debug symbols
 chromium-browser-l10n - chromium-browser language packages
 chromium-codecs-ffmpeg - Free ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-dbg - chromium-codecs-ffmpeg debug symbols
 chromium-codecs-ffmpeg-extra - Extra ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-extra-dbg - chromium-codecs-ffmpeg-extra debug symbols
Launchpad-Bugs-Fixed: 889711 897389 914648 923602
Changes: 
 chromium-browser (16.0.912.77~r118311-0ubuntu1) precise; urgency=low
 .
   * New upstream release from the Stable Channel (LP: #923602, #897389)
     (LP: #914648, #889711)
     This release fixes the following security issues:
     - [106484] High CVE-2011-3924: Use-after-free in DOM selections. Credit to
       Arthur Gerkis.
     - [107182] Critical CVE-2011-3925: Use-after-free in Safe Browsing
       navigation. Credit to Chamal de Silva.
     - [108461] High CVE-2011-3928: Use-after-free in DOM handling. Credit to
       wushi of team509 reported through ZDI (ZDI-CAN-1415).
     - [108605] High CVE-2011-3927: Uninitialized value in Skia. Credit to
       miaubiz.
     - [109556] High CVE-2011-3926: Heap-buffer-overflow in tree builder.
       Credit to Arthur Gerkis.
 .
     This upload also includes the following security fixes from 16.0.912.75:
     - [106672] High CVE-2011-3921: Use-after-free in animation frames. Credit to
       Boris Zbarsky of Mozilla.
     - [107128] High CVE-2011-3919: Heap-buffer-overflow in libxml. Credit to
       Jüri Aedla.
     - [108006] High CVE-2011-3922: Stack-buffer-overflow in glyph handling.
       Credit to Google Chrome Security Team (Cris Neckar).
 .
     This upload also includes the following security fixes from 16.0.912.63:
     - [81753] Medium CVE-2011-3903: Out-of-bounds read in regex matching. Credit
       to David Holloway of the Chromium development community.
     - [95465] Low CVE-2011-3905: Out-of-bounds reads in libxml. Credit to Google
       Chrome Security Team (Inferno).
     - [98809] Medium CVE-2011-3906: Out-of-bounds read in PDF parser. Credit to
       Aki Helin of OUSPG.
     - [99016] High CVE-2011-3907: URL bar spoofing with view-source. Credit to
       Luka Treiber of ACROS Security.
     - [100863] Low CVE-2011-3908: Out-of-bounds read in SVG parsing. Credit to
       Aki Helin of OUSPG.
     - [101010] Medium CVE-2011-3909: [64-bit only] Memory corruption in CSS
       property array. Credit to Google Chrome Security Team (scarybeasts) and
       Chu.
     - [101494] Medium CVE-2011-3910: Out-of-bounds read in YUV video frame
       handling. Credit to Google Chrome Security Team (Cris Neckar).
     - [101779] Medium CVE-2011-3911: Out-of-bounds read in PDF. Credit to Google
       Chrome Security Team (scarybeasts) and Robert Swiecki of the Google
       Security Team.
     - [102359] High CVE-2011-3912: Use-after-free in SVG filters. Credit to
       Arthur Gerkis.
     - [103921] High CVE-2011-3913: Use-after-free in Range handling. Credit to
       Arthur Gerkis.
     - [104011] High CVE-2011-3914: Out-of-bounds write in v8 i18n handling.
       Credit to Sławomir Błażek.
     - [104529] High CVE-2011-3915: Buffer overflow in PDF font handling. Credit
       to Atte Kettunen of OUSPG.
     - [104959] Medium CVE-2011-3916: Out-of-bounds reads in PDF cross
       references. Credit to Atte Kettunen of OUSPG.
     - [105162] Medium CVE-2011-3917: Stack-buffer-overflow in FileWatcher.
       Credit to Google Chrome Security Team (Marty Barbella).
 .
     This upload also includes the following fixes from 15.0.874.121:
     - fix to a regression: SVG in iframe doesn't use specified dimensions
     - [103259] High CVE-2011-3900: Out-of-bounds write in v8. Credit to
       Christian Holler
 .
   [ Micah Gersten <micahg at ubuntu.com> ]
   * Add patch to build with glib 2.31 (single entry header inclusion)
     - add debian/patches/glib-header-single-entry.patch
     - update debian/patches/series
 .
   [ Brandon Snider <brandonsnider at ubuntu.com> ]
   * Refresh user agent patch
     - update debian/patches/chromium_useragent.patch.in
Checksums-Sha1: 
 5f95a9339ed828f93967f6078b8eb90bed7ae761 2445 chromium-browser_16.0.912.77~r118311-0ubuntu1.dsc
 a3e326797a392b128fe21226b3b9b7b73ec8e4d0 203601 chromium-browser_16.0.912.77~r118311-0ubuntu1.diff.gz
Checksums-Sha256: 
 06074c40a2fd752fa39404fef3b08d3dd4cf98d0d1b23e89a4a077769313cdf5 2445 chromium-browser_16.0.912.77~r118311-0ubuntu1.dsc
 d7056d3f6cf64c22e851de8bc3ae22c7b2015995fa007b509a98d48ce955d521 203601 chromium-browser_16.0.912.77~r118311-0ubuntu1.diff.gz
Files: 
 fc7beaeeec811384a1b797479ecbbc10 2445 web optional chromium-browser_16.0.912.77~r118311-0ubuntu1.dsc
 83d6cb0b878a32c50174dbd993f0209e 203601 web optional chromium-browser_16.0.912.77~r118311-0ubuntu1.diff.gz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk8nAQ8ACgkQTniv4aqX/VnDDACdHqbPCqvYK8pihRq+bGzde9iU
NAYAn0Lj+CZLv7Cck8CEwsiQ0n1l8xdl
=UVvh
-----END PGP SIGNATURE-----


More information about the Precise-changes mailing list