[ubuntu/raring-proposed] chromium-browser 24.0.1312.56-0ubuntu1 (Accepted)

Chad Miller chad.miller at canonical.com
Mon Jan 28 21:46:04 UTC 2013


chromium-browser (24.0.1312.56-0ubuntu1) raring-proposed; urgency=low

  * Add comment-markers to debian/patches/series file to make patch import
    easier.
  * debian/patches/gyp-config-root.patch
    - Added. Avoids compilation bug on (at least) ARM.
  * debian/patches/arm-neon.patch
    - Added function to determine NEON functionality in ARM at runtime for
      WebRt library in WebKit.
  * Update README.source to include some of these changes.
  * Set new URL for channel-release info in rules file.
  * debian/chromium-browser.install
    - No longer install demo extension
    - Install remoting locales
  * debian/patches/chromium_useragent.patch.in renamed to drop ".in",
    OS "Ubuntu" hardcoded with no compilation-release name, and patch
    refreshed to follow new location of source.  Also remove it
    from the list of ephemeral files that "clean" rule removes.
  * In debian/rules, use "-delete" flag on find instead of "-exec rm {} \;",
    to be safer and faster.
  * Make most patches follow a common format (no timestamps or Index lines), to
    avoid future churn.
  * Write the "REMOVED" list files to the root of the orig tarball,
    instead of inside the src/ directory, where they could collide.
  * Fix dpkg-source warning: Clean up python cached bytecode files.
  * Also don't include python bytecode or cache files in orig tarball,
    and clean then up on "clean" rule.
  * Fix dpkg-source warning: Remove autoconf cache.
  * Fix lintian warning: fta and micahg to XSBC-Original-Maintainer.
  * Fix lintian error not-binnmuable-all-depends-any.
  * Override lintian complaints ancient-autotools-helper-file and
    unused-build-dependency-on-cdbs.
  * Drop "lzma" from build dependencies.
  * Set default binary and source package compression to xz. If
    building for Ubuntu 10.04, then make binary's compression to bzip2.
  * List explicit architectures that Chromium supports, instead of "any".
    Cr {arm ia32 x64} map into Debian {armhf armel i386 amd64}.
  * debian/patches/arm-neon.patch added to get ARM w/o Neon support.
    (LP: #1084852)
  * Add chromedriver packaging. (LP: #1069930) Thanks to
    John Rigby <john.rigby at linaro.org>
  * In debian/rules, avoid creating invalid subst expression in sed
    of DEBIAN* vars into files.
  * Note localization in package description for support for ast, bs, en-AU,
    eo, hy, ia, ka, ku, kw, ms.
  * No longer include Launchpad-generated translations.  Disable patch
    grd_parse_fix.patch .
  * Set default binary and source package compression to xz. If
    building for Ubuntu 10.04, then make binary's compression to bzip2.
  * No longer expect unpacked tarball to contain "build-tree".
  * Fix build warning about missing debian/source/format.  Set to "3.0
    (quilt)".
  * Remove unnecessary glib-header-single-entry.patch .
  * Manually set DEB_{BUILD,HOST}_ARCH when not already set, like when the
    executing program is not dpkg-buildpackage.
  * Make rules file generate LASTCHANGE file at new location.
  * Change get-sources command to kill script when it fails to disable
    gyp-chromium run from DEPS. Never fail silently again.
  * Add patches/struct-siginfo.patch to work around source bug in dereferencing
    internal stuct instead of public type.
  * Drop SCM revision from the version.
  * Refresh patches from lp:unity-chromium-extension .
  * Make all patches follow a common format, to avoid future churn.
    No timestamps, a/b parent, sorted, no index.
  * New upstream version 24.0.1312.56:
    - CVE-2013-0839: Use-after-free in canvas font handling.
    - CVE-2013-0840: Missing URL validation when opening new windows.
    - CVE-2013-0841: Unchecked array index in content blocking.
    - CVE-2013-0842: Problems with NULL characters embedded in paths.
  * New upstream version 24.0.1312.52:  (LP: #1099075)
    - CVE-2012-5145: Use-after-free in SVG layout. Credit to Atte Kettunen of
      OUSPG.
    - CVE-2012-5146: Same origin policy bypass with malformed URL. Credit to
      Erling A Ellingsen and Subodh Iyengar, both of Facebook.
    - CVE-2012-5147: Use-after-free in DOM handling. Credit to José A. Vázquez.
    - CVE-2012-5148: Missing filename sanitization in hyphenation support.
      Credit to Google Chrome Security Team (Justin Schuh).
    - CVE-2012-5149: Integer overflow in audio IPC handling. Credit to Google
      Chrome Security Team (Chris Evans).
    - CVE-2012-5150: Use-after-free when seeking video. Credit to Google Chrome
      Security Team (Inferno).
    - CVE-2012-5151: Integer overflow in PDF JavaScript. Credit to Mateusz
      Jurczyk, with contribution from Gynvael Coldwind, both of Google Security
      Team.
    - CVE-2012-5152: Out-of-bounds read when seeking video. Credit to Google
      Chrome Security Team (Inferno).
    - CVE-2012-5153: Out-of-bounds stack access in v8. Credit to Andreas
      Rossberg of the Chromium development community.
    - CVE-2012-5156: Use-after-free in PDF fields. Credit to Mateusz Jurczyk,
      with contribution from Gynvael Coldwind, both of Google Security Team.
    - CVE-2012-5157: Out-of-bounds reads in PDF image handling. Credit to
      Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google
      Security Team.
    - CVE-2013-0828: Bad cast in PDF root handling. Credit to Mateusz Jurczyk,
      with contribution from Gynvael Coldwind, both of Google Security Team.
    - CVE-2013-0829: Corruption of database metadata leading to incorrect file
      access. Credit to Google Chrome Security Team (Jüri Aedla).
    - CVE-2013-0830: Missing NUL termination in IPC. Credit to Google Chrome
      Security Team (Justin Schuh).
    - CVE-2013-0831: Possible path traversal from extension process. Credit to
      Google Chrome Security Team (Tom Sepez).
    - CVE-2013-0832: Use-after-free with printing. Credit to Google Chrome
      Security Team (Cris Neckar).
    - CVE-2013-0833: Out-of-bounds read with printing. Credit to Google Chrome
      Security Team (Cris Neckar).
    - CVE-2013-0834: Out-of-bounds read with glyph handling. Credit to Google
      Chrome Security Team (Cris Neckar).
    - CVE-2013-0835: Browser crash with geolocation. Credit to Arthur Gerkis.
    - CVE-2013-0836: Crash in v8 garbage collection. Credit to Google Chrome
      Security Team (Cris Neckar).
    - CVE-2013-0837: Crash in extension tab handling. Credit to Tom Nielsen.
    - CVE-2013-0838: Tighten permissions on shared memory segments. Credit to
      Google Chrome Security Team (Chris Palmer).
  * New upstream version 23.0.1271.97
    - CVE-2012-5139: Use-after-free with visibility events.
    - CVE-2012-5140: Use-after-free in URL loader.
    - CVE-2012-5141: Limit Chromoting client plug-in instantiation.
    - CVE-2012-5142: Crash in history navigation.
    - CVE-2012-5143: Integer overflow in PPAPI image buffers.
    - CVE-2012-5144: Stack corruption in AAC decoding.
  * New upstream version 23.0.1271.95
    - CVE-2012-5138: Incorrect file path handling.
    - CVE-2012-5137: Use-after-free in media source handling.
  * New upstream version 23.0.1271.91
    - CVE-2012-5133: Use-after-free in SVG filters.
    - CVE-2012-5130: Out-of-bounds read in Skia.
    - CVE-2012-5132: Browser crash with chunked encoding.
    - CVE-2012-5134: Buffer underflow in libxml.
    - CVE-2012-5135: Use-after-free with printing.
    - CVE-2012-5136: Bad cast in input element handling.
  * Includes CVE fixes for 23.0.1271.64
    - CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP
      handling.
    - CVE-2012-5120: Out-of-bounds array access in v8.
    - CVE-2012-5116: Use-after-free in SVG filter handling.
    - CVE-2012-5121: Use-after-free in video layout.
    - CVE-2012-5117: Inappropriate load of SVG subresource in img context.
    - CVE-2012-5119: Race condition in Pepper buffer handling.
    - CVE-2012-5122: Bad cast in input handling.
    - CVE-2012-5123: Out-of-bounds reads in Skia.
    - CVE-2012-5124: Memory corruption in texture handling.
    - CVE-2012-5125: Use-after-free in extension tab handling.
    - CVE-2012-5126: Use-after-free in plug-in placeholder handling.
    - CVE-2012-5128: Bad write in v8.
  * Disable lintian warnings about outdated autoconf files in source tree.

Date: Wed, 23 Jan 2013 13:43:34 -0500
Changed-By: Chad Miller <chad.miller at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Jamie Strandboge <jamie at ubuntu.com>
https://launchpad.net/ubuntu/raring/+source/chromium-browser/24.0.1312.56-0ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 23 Jan 2013 13:43:34 -0500
Source: chromium-browser
Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-codecs-ffmpeg chromium-codecs-ffmpeg-dbg chromium-codecs-ffmpeg-extra chromium-codecs-ffmpeg-extra-dbg chromium-chromedriver
Architecture: source
Version: 24.0.1312.56-0ubuntu1
Distribution: raring-proposed
Urgency: low
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Chad Miller <chad.miller at canonical.com>
Description: 
 chromium-browser - Chromium browser
 chromium-browser-dbg - chromium-browser debug symbols
 chromium-browser-l10n - chromium-browser language packages
 chromium-chromedriver - WebDriver driver for the Chromium Browser
 chromium-codecs-ffmpeg - Free ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-dbg - chromium-codecs-ffmpeg debug symbols
 chromium-codecs-ffmpeg-extra - Extra ffmpeg codecs for the Chromium Browser
 chromium-codecs-ffmpeg-extra-dbg - chromium-codecs-ffmpeg-extra debug symbols
Launchpad-Bugs-Fixed: 1069930 1084852 1099075
Changes: 
 chromium-browser (24.0.1312.56-0ubuntu1) raring-proposed; urgency=low
 .
   * Add comment-markers to debian/patches/series file to make patch import
     easier.
   * debian/patches/gyp-config-root.patch
     - Added. Avoids compilation bug on (at least) ARM.
   * debian/patches/arm-neon.patch
     - Added function to determine NEON functionality in ARM at runtime for
       WebRt library in WebKit.
   * Update README.source to include some of these changes.
   * Set new URL for channel-release info in rules file.
   * debian/chromium-browser.install
     - No longer install demo extension
     - Install remoting locales
   * debian/patches/chromium_useragent.patch.in renamed to drop ".in",
     OS "Ubuntu" hardcoded with no compilation-release name, and patch
     refreshed to follow new location of source.  Also remove it
     from the list of ephemeral files that "clean" rule removes.
   * In debian/rules, use "-delete" flag on find instead of "-exec rm {} \;",
     to be safer and faster.
   * Make most patches follow a common format (no timestamps or Index lines), to
     avoid future churn.
   * Write the "REMOVED" list files to the root of the orig tarball,
     instead of inside the src/ directory, where they could collide.
   * Fix dpkg-source warning: Clean up python cached bytecode files.
   * Also don't include python bytecode or cache files in orig tarball,
     and clean then up on "clean" rule.
   * Fix dpkg-source warning: Remove autoconf cache.
   * Fix lintian warning: fta and micahg to XSBC-Original-Maintainer.
   * Fix lintian error not-binnmuable-all-depends-any.
   * Override lintian complaints ancient-autotools-helper-file and
     unused-build-dependency-on-cdbs.
   * Drop "lzma" from build dependencies.
   * Set default binary and source package compression to xz. If
     building for Ubuntu 10.04, then make binary's compression to bzip2.
   * List explicit architectures that Chromium supports, instead of "any".
     Cr {arm ia32 x64} map into Debian {armhf armel i386 amd64}.
   * debian/patches/arm-neon.patch added to get ARM w/o Neon support.
     (LP: #1084852)
   * Add chromedriver packaging. (LP: #1069930) Thanks to
     John Rigby <john.rigby at linaro.org>
   * In debian/rules, avoid creating invalid subst expression in sed
     of DEBIAN* vars into files.
   * Note localization in package description for support for ast, bs, en-AU,
     eo, hy, ia, ka, ku, kw, ms.
   * No longer include Launchpad-generated translations.  Disable patch
     grd_parse_fix.patch .
   * Set default binary and source package compression to xz. If
     building for Ubuntu 10.04, then make binary's compression to bzip2.
   * No longer expect unpacked tarball to contain "build-tree".
   * Fix build warning about missing debian/source/format.  Set to "3.0
     (quilt)".
   * Remove unnecessary glib-header-single-entry.patch .
   * Manually set DEB_{BUILD,HOST}_ARCH when not already set, like when the
     executing program is not dpkg-buildpackage.
   * Make rules file generate LASTCHANGE file at new location.
   * Change get-sources command to kill script when it fails to disable
     gyp-chromium run from DEPS. Never fail silently again.
   * Add patches/struct-siginfo.patch to work around source bug in dereferencing
     internal stuct instead of public type.
   * Drop SCM revision from the version.
   * Refresh patches from lp:unity-chromium-extension .
   * Make all patches follow a common format, to avoid future churn.
     No timestamps, a/b parent, sorted, no index.
   * New upstream version 24.0.1312.56:
     - CVE-2013-0839: Use-after-free in canvas font handling.
     - CVE-2013-0840: Missing URL validation when opening new windows.
     - CVE-2013-0841: Unchecked array index in content blocking.
     - CVE-2013-0842: Problems with NULL characters embedded in paths.
   * New upstream version 24.0.1312.52:  (LP: #1099075)
     - CVE-2012-5145: Use-after-free in SVG layout. Credit to Atte Kettunen of
       OUSPG.
     - CVE-2012-5146: Same origin policy bypass with malformed URL. Credit to
       Erling A Ellingsen and Subodh Iyengar, both of Facebook.
     - CVE-2012-5147: Use-after-free in DOM handling. Credit to José A. Vázquez.
     - CVE-2012-5148: Missing filename sanitization in hyphenation support.
       Credit to Google Chrome Security Team (Justin Schuh).
     - CVE-2012-5149: Integer overflow in audio IPC handling. Credit to Google
       Chrome Security Team (Chris Evans).
     - CVE-2012-5150: Use-after-free when seeking video. Credit to Google Chrome
       Security Team (Inferno).
     - CVE-2012-5151: Integer overflow in PDF JavaScript. Credit to Mateusz
       Jurczyk, with contribution from Gynvael Coldwind, both of Google Security
       Team.
     - CVE-2012-5152: Out-of-bounds read when seeking video. Credit to Google
       Chrome Security Team (Inferno).
     - CVE-2012-5153: Out-of-bounds stack access in v8. Credit to Andreas
       Rossberg of the Chromium development community.
     - CVE-2012-5156: Use-after-free in PDF fields. Credit to Mateusz Jurczyk,
       with contribution from Gynvael Coldwind, both of Google Security Team.
     - CVE-2012-5157: Out-of-bounds reads in PDF image handling. Credit to
       Mateusz Jurczyk, with contribution from Gynvael Coldwind, both of Google
       Security Team.
     - CVE-2013-0828: Bad cast in PDF root handling. Credit to Mateusz Jurczyk,
       with contribution from Gynvael Coldwind, both of Google Security Team.
     - CVE-2013-0829: Corruption of database metadata leading to incorrect file
       access. Credit to Google Chrome Security Team (Jüri Aedla).
     - CVE-2013-0830: Missing NUL termination in IPC. Credit to Google Chrome
       Security Team (Justin Schuh).
     - CVE-2013-0831: Possible path traversal from extension process. Credit to
       Google Chrome Security Team (Tom Sepez).
     - CVE-2013-0832: Use-after-free with printing. Credit to Google Chrome
       Security Team (Cris Neckar).
     - CVE-2013-0833: Out-of-bounds read with printing. Credit to Google Chrome
       Security Team (Cris Neckar).
     - CVE-2013-0834: Out-of-bounds read with glyph handling. Credit to Google
       Chrome Security Team (Cris Neckar).
     - CVE-2013-0835: Browser crash with geolocation. Credit to Arthur Gerkis.
     - CVE-2013-0836: Crash in v8 garbage collection. Credit to Google Chrome
       Security Team (Cris Neckar).
     - CVE-2013-0837: Crash in extension tab handling. Credit to Tom Nielsen.
     - CVE-2013-0838: Tighten permissions on shared memory segments. Credit to
       Google Chrome Security Team (Chris Palmer).
   * New upstream version 23.0.1271.97
     - CVE-2012-5139: Use-after-free with visibility events.
     - CVE-2012-5140: Use-after-free in URL loader.
     - CVE-2012-5141: Limit Chromoting client plug-in instantiation.
     - CVE-2012-5142: Crash in history navigation.
     - CVE-2012-5143: Integer overflow in PPAPI image buffers.
     - CVE-2012-5144: Stack corruption in AAC decoding.
   * New upstream version 23.0.1271.95
     - CVE-2012-5138: Incorrect file path handling.
     - CVE-2012-5137: Use-after-free in media source handling.
   * New upstream version 23.0.1271.91
     - CVE-2012-5133: Use-after-free in SVG filters.
     - CVE-2012-5130: Out-of-bounds read in Skia.
     - CVE-2012-5132: Browser crash with chunked encoding.
     - CVE-2012-5134: Buffer underflow in libxml.
     - CVE-2012-5135: Use-after-free with printing.
     - CVE-2012-5136: Bad cast in input element handling.
   * Includes CVE fixes for 23.0.1271.64
     - CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP
       handling.
     - CVE-2012-5120: Out-of-bounds array access in v8.
     - CVE-2012-5116: Use-after-free in SVG filter handling.
     - CVE-2012-5121: Use-after-free in video layout.
     - CVE-2012-5117: Inappropriate load of SVG subresource in img context.
     - CVE-2012-5119: Race condition in Pepper buffer handling.
     - CVE-2012-5122: Bad cast in input handling.
     - CVE-2012-5123: Out-of-bounds reads in Skia.
     - CVE-2012-5124: Memory corruption in texture handling.
     - CVE-2012-5125: Use-after-free in extension tab handling.
     - CVE-2012-5126: Use-after-free in plug-in placeholder handling.
     - CVE-2012-5128: Bad write in v8.
   * Disable lintian warnings about outdated autoconf files in source tree.
Checksums-Sha1: 
 63085e8bd37b5526cf904ae2d13eef564893b744 3307 chromium-browser_24.0.1312.56-0ubuntu1.dsc
 0f004808ca376fad407eed8aeb97b90acfc8fcb4 324420028 chromium-browser_24.0.1312.56.orig.tar.xz
 25295b90c636e11dd3068e924f11120c666be884 239671 chromium-browser_24.0.1312.56-0ubuntu1.debian.tar.gz
Checksums-Sha256: 
 1b62d36bdb9e777b8ee75f72038fad5f0eb561aff54a6490d59d9879cfeff914 3307 chromium-browser_24.0.1312.56-0ubuntu1.dsc
 03506562d70892230772f3dc29b2c28782764854ee4766ea639f4afcc2ffc689 324420028 chromium-browser_24.0.1312.56.orig.tar.xz
 2d6a0e61e35a90cd4532dedd6a7e600f21150cfffdebae2b3fff1fc1fab2f518 239671 chromium-browser_24.0.1312.56-0ubuntu1.debian.tar.gz
Files: 
 50f725054fdcdb4cf8179f915698ea6a 3307 web optional chromium-browser_24.0.1312.56-0ubuntu1.dsc
 7d9328b3819b250ca057ffefbb16e888 324420028 web optional chromium-browser_24.0.1312.56.orig.tar.xz
 6c921c0653c53f4228b33b3d7ecfc787 239671 web optional chromium-browser_24.0.1312.56-0ubuntu1.debian.tar.gz
Original-Maintainer: Micah Gersten <micahg at ubuntu.com>, Fabien Tassin <fta at ubuntu.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=FC6t
-----END PGP SIGNATURE-----


More information about the Raring-changes mailing list