--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: unblock: chromium-browser/20.0.1132.57~r145807-1
- From: Giuseppe Iuculano <giuseppe@iuculano.it>
- Date: Sun, 22 Jul 2012 11:12:26 +0200
- Message-id: <20120722091226.4449.1325.reportbug@sd6-mobile>
Package: release.debian.org
Severity: normal
User: release.debian.org@packages.debian.org
Usertags: unblock
Please unblock package chromium-browser
chromium-browser (20.0.1132.57~r145807-1) unstable; urgency=medium
.
[ Michael Gilbert ]
* New ustream stable security release:
- [129898] High CVE-2012-2842: Use-after-free in counter handling. Credit
to miaubiz.
- [130595] High CVE-2012-2843: Use-after-free in layout height tracking.
Credit to miaubiz.
- [133450] High CVE-2012-2844: Bad object access with JavaScript in PDF.
Credit to Alexey Samsonov of Google.
.
[ Shawn Landden ]
* Revert "Do not use binutils-gold in armel and armhf".
* Update vpx patch to use system headers (Closes: #674728).
* Fixup skia fixup for <armv6.
unblock chromium-browser/20.0.1132.57~r145807-1
-- System Information:
Debian Release: wheezy/sid
APT prefers testing-proposed-updates
APT policy: (990, 'testing-proposed-updates'), (990, 'testing'), (500, 'unstable'), (110, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 3.2.0-3-686-pae (SMP w/2 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---