Bug#602686: marked as done (unblock: chromium-browser/6.0.472.63~r59945-2)
Your message dated Sun, 07 Nov 2010 12:18:01 +0100
with message-id <4CD68AE9.30703@dogguy.org>
and subject line Re: Bug#602686: unblock: chromium-browser/6.0.472.63~r59945-2
has caused the Debian Bug report #602686,
regarding unblock: chromium-browser/6.0.472.63~r59945-2
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
602686: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=602686
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: freeze-exception
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Please unblock package chromium-browser
chromium-browser (6.0.472.63~r59945-2) unstable; urgency=high
* Added the missing changelog credit for the 5.0.375.29~r46008-1 revision.
Obviously this was not a "stealing" as foolishly written by Fabien Tassin
in a blog rant, but was a bad debian/changelog merge.
* Backported security patches from stable:
- High Use-after-free in text editing. Credit to David Bloom of the Google
Security Team, Google Chrome Security Team (Inferno) and Google Chrome
Security Team (Cris Neckar).
- High Memory corruption with enormous text area. Credit to wushi of
team509.
- High Bad cast with the SVG use element. Credit to the kuzzcc.
- High Use-after-free in text control selections. Credit to "vkouchna".
- High Integer overflows in font handling. Credit to Aki Helin of OUSPG.
- High Bad use of destroyed frame object. Credit to various developers,
including "gundlach".
- High Type confusions with event objects. Credit to "fam.lam" and Google
Chrome Security Team (Inferno).
- High Out-of-bounds array access in SVG handling. Credit to wushi of
team509.
unblock chromium-browser/6.0.472.63~r59945-2
Cheers,
Giuseppe.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkzWVUYACgkQNxpp46476appGwCfaXsVOxYxdNYdx9SwVE07RRMr
25EAoIGckfg/18zTuS4B+L3JGq4HD45p
=+Ayu
-----END PGP SIGNATURE-----
--- End Message ---
--- Begin Message ---
On 11/07/2010 08:29 AM, Giuseppe Iuculano wrote:
> Package: release.debian.org
> Severity: normal
> User: release.debian.org@packages.debian.org
> Usertags: freeze-exception
>
> Please unblock package chromium-browser
>
Unblocked.
Regards,
--
Mehdi Dogguy مهدي الدڤي
http://dogguy.org/
--- End Message ---
Reply to: