chromium-browser 35.0.1916.153-1 source package in Debian
Changelog
chromium-browser (35.0.1916.153-1) unstable; urgency=high * New upstream stable release: - CVE-2014-3154: Use-after-free in filesystem api. Credit to Collin Payne. - CVE-2014-3155: Out-of-bounds read in SPDY. Credit to James March, Daniel Sommermann and Alan Frindell of Facebook. - CVE-2014-3156: Buffer overflow in clipboard. Credit to Atte Kettunen. - CVE-2014-3157: Heap overflow in media. * Don't set sse2 compiler flags on i386 (closes: #750361). * Prefer libgcrypt11 (closes: #750304). -- Michael Gilbert <email address hidden> Wed, 11 Jun 2014 02:31:22 +0000
Upload details
- Uploaded by:
- Debian Chromium Maintainers
- Uploaded to:
- Sid
- Original maintainer:
- Debian Chromium Maintainers
- Architectures:
- i386 amd64 all
- Section:
- web
- Urgency:
- Very Urgent
See full publishing history Publishing
Series | Published | Component | Section |
---|
Builds
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
chromium-browser_35.0.1916.153-1.dsc | 4.0 KiB | db9928df62756fa503f94fdd5454aa1bcdaaab0458b9f112f412e9a020a1f51b |
chromium-browser_35.0.1916.153.orig.tar.xz | 780.0 MiB | 750ae12d66663d9f7df061d12f6304ada6c692acfd0a0d4c4ebe93b717c13340 |
chromium-browser_35.0.1916.153-1.debian.tar.xz | 198.7 KiB | 8996ca98321fb2fed4dc30f59de835de324b010039102240c4370c9145ce71a1 |
No changes file available.