[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#607738: marked as done (unblock: chromium-browser/6.0.472.63~r59945-4)



Your message dated Thu, 23 Dec 2010 20:05:14 +0100
with message-id <4D139D6A.7060604@dogguy.org>
and subject line Re: Bug#607738: unblock: chromium-browser/6.0.472.63~r59945-4
has caused the Debian Bug report #607738,
regarding unblock: chromium-browser/6.0.472.63~r59945-4
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
607738: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=607738
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: freeze-exception

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please unblock package chromium-browser

chromium-browser (6.0.472.63~r59945-4) unstable; urgency=high

  * Backported security patches from stable:
    - [64-bit Linux only] High Bad validation for message deserialization on
      64-bit builds. Credit to Lei Zhang of the Chromium development community.
    - Low Browser crash with NULL pointer in web worker handling. Credit to 
      Nathan Weizenbaum of Google.
    - Medium Out-of-bounds read in CSS parsing. Credit to Chris Rohlf.
    - High Stale pointers in cursor handling. Credit to Sławomir Błażek and
      Sergey Glazunov.

 -- Giuseppe Iuculano <iuculano@debian.org>  Sat, 18 Dec 2010 17:39:19 +0100

chromium-browser (6.0.472.63~r59945-3) unstable; urgency=high

  * Backported security patches from stable:
    - Medium Cross-origin video theft with <canvas>. Credit to Nirankush
      Panchbhai and Microsoft Vulnerability Research (MSVR).
    - High Use after free in history handling. Credit to Stefan Troger.
    - Medium Make sure the “dangerous file types” list is uptodate with the
      Windows platforms. Credit to Billy Rios of the Google Security Team.
    - High Crash due to bad indexing with malformed video. Credit to miaubiz. 
    - High Use after free with SVG animations. Credit to Sławomir Błażek.
    - Medium Use after free in mouse dragging event handling. Credit to kuzzcc.

 -- Giuseppe Iuculano <iuculano@debian.org>  Tue, 07 Dec 2010 12:53:25 +0100

unblock chromium-browser/6.0.472.63~r59945-4

- -- System Information:
Debian Release: squeeze/sid
  APT prefers testing-proposed-updates
  APT policy: (990, 'testing-proposed-updates'), (990, 'testing'), (990, 'stable'), (500, 'proposed-updates'), (500, 'unstable'), (101, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAk0QzQkACgkQNxpp46476aq+PACgghzg2sMKUIwN6aVnT3g8L0x5
PnMAn3QWFQBrY6rB9RM0X7z1dJt4nw/f
=ktIT
-----END PGP SIGNATURE-----



--- End Message ---
--- Begin Message ---
On 21/12/2010 16:51, Giuseppe Iuculano wrote:
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: freeze-exception

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Please unblock package chromium-browser


Done.

Regards,

--
Mehdi Dogguy مهدي الدڤي
http://dogguy.org/


--- End Message ---

Reply to: