-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.8 Date: Thu, 24 Oct 2013 04:12:35 +0000 Source: chromium-browser Binary: chromium-browser chromium-browser-dbg chromium-browser-l10n chromium-browser-inspector chromium chromium-dbg chromium-l10n chromium-inspector Architecture: i386 Version: 30.0.1599.101-1~deb7u1 Distribution: wheezy-security Urgency: high Maintainer: amd64 Build Daemon (binet) Changed-By: Michael Gilbert Description: chromium - Google's open source chromium web browser chromium-browser - Chromium browser - transitional dummy package chromium-browser-dbg - chromium-browser debug symbols transitional dummy package chromium-browser-inspector - page inspector for the chromium-browser - transitional dummy pack chromium-browser-l10n - chromium-browser language packages - transitional dummy package chromium-dbg - Debugging symbols for the chromium web browser chromium-inspector - page inspector for the chromium browser chromium-l10n - chromium-browser language packages Changes: chromium-browser (30.0.1599.101-1~deb7u1) stable-security; urgency=high . * New stable release: - High CVE-2013-2925: Use after free in XHR. Credit to Atte Kettunen of OUSPG. - High CVE-2013-2926: Use after free in editing. Credit to cloudfuzzer. - High CVE-2013-2927: Use after free in forms. Credit to cloudfuzzer. - CVE-2013-2928: Various fixes from internal audits, fuzzing and other initiatives. - Medium CVE-2013-2906: Races in Web Audio. Credit to Atte Kettunen of OUSPG. - Medium CVE-2013-2907: Out of bounds read in Window.prototype object. Credit to Boris Zbarsky. - Medium CVE-2013-2908: Address bar spoofing related to the "204 No Content" status code. Credit to Chamal de Silva. - High CVE-2013-2909: Use after free in inline-block rendering. Credit to Atte Kettunen of OUSPG. - Medium CVE-2013-2910: Use-after-free in Web Audio. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC). - High CVE-2013-2911: Use-after-free in XSLT. Credit to Atte Kettunen of OUSPG. - High CVE-2013-2912: Use-after-free in PPAPI. Credit to Chamal de Silva and 41.w4r10r(at)garage4hackers.com. - High CVE-2013-2913: Use-after-free in XML document parsing. Credit to cloudfuzzer. - High CVE-2013-2914: Use after free in the Windows color chooser dialog. Credit to Khalil Zhani. - Low CVE-2013-2915: Address bar spoofing via a malformed scheme. Credit to Wander Groeneveld. - High CVE-2013-2916: Address bar spoofing related to the "204 No Content” status code. Credit to Masato Kinugawa. - Medium CVE-2013-2917: Out of bounds read in Web Audio. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC). - High CVE-2013-2918: Use-after-free in DOM. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC). - High CVE-2013-2919: Memory corruption in V8. Credit to Adam Haile of Concrete Data. - Medium CVE-2013-2920: Out of bounds read in URL parsing. Credit to Atte Kettunen of OUSPG. - High CVE-2013-2921: Use-after-free in resource loader. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC). - High CVE-2013-2922: Use-after-free in template element. Credit to Jon Butler. - CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives (Chrome 30). - Medium CVE-2013-2924: Use-after-free in ICU. Upstream bug here. Checksums-Sha1: d6c87af1b5dd1d7bd78127754c80fd3331e1880d 46934038 chromium_30.0.1599.101-1~deb7u1_i386.deb 55813899b8d5ee8f62aa404f40f01299db16d9ef 462225838 chromium-dbg_30.0.1599.101-1~deb7u1_i386.deb Checksums-Sha256: d01806d76a38c12e34e5db09be097634d8574839163341eab3589f863f39d764 46934038 chromium_30.0.1599.101-1~deb7u1_i386.deb 4b58ea8765a2512e1df16058350275bc0ec5e40d1dff7dc20c91d6b38b96ea84 462225838 chromium-dbg_30.0.1599.101-1~deb7u1_i386.deb Files: fe5506f0faef21f2001f7200e8f6a1ef 46934038 web optional chromium_30.0.1599.101-1~deb7u1_i386.deb 75a8f6261aa2856ab6470699d79cc916 462225838 debug extra chromium-dbg_30.0.1599.101-1~deb7u1_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBAgAGBQJSaVDJAAoJEBtF8vmRXu1YYf8P/0XnJknyLbEnEHao8HB4As4J 2skLHHfEm5NZ4ly0kMQdsc5S+Ph785h7Mc+LOQFw5jt07yYUmrWsiRjPqkJGJ947 n9qqKRiFQO0tybv7xb3IIis1m98agfhVPU3ID2reVgqfyh+4SsYlQYITVFEcOdbo 0eA5a6AgU6Pei43qGXC5+YNANqQHAxfilVEDbblssucvtNhpm5Ue5ana7Kq76YGF MC5P8vhyqq7RudSYJieFnciYDX2b3PvbYwTudGY2Jb4X30hmKW/V3OXDearFpVS8 cJyoPiZDu2LvCd4rEp9SzhYSs3nKPr0NgXOT3t3PEYEfo355VOrKMMAGKElwe7jR z7dCW2URjY7WeKldUTY4zJzTwXsG/dG2XouCIGuz7CMX2cqCc38aGfALmWVsz2v/ ou180Pl6eY1e8yRSQJp+vkEx4G83rV3kINcrMKRL37lF9tyNKI+Jxp/OwH1B8XtO 5VZ9GiCJkEvnJt2sqTsHAsyZlnDoMNTwWcqRKodPvQtQ1gskzpFBV1tnJ0+f3Bev eMA/sYeSUWan+K4ehWAaqZfEaZz9xJ6aGNTY5qt9ws5V0MP4D77LF7jNfdG073FH hNex1In8qH2BO6sSbBSY2/8eVMSPjdBH2nwnhYXD99p6hsQ97qsHnclLFBTzSicI wdVyMolEJ+WsFBhJYwLV =TYOZ -----END PGP SIGNATURE-----