* New upstream release from the Stable Channel (LP: #612109)
This release fixes the following security issues:
- [42736] Medium Memory contents disclosure in layout code. Credit to
Michail Nikolaev.
- [43813] High Issue with large canvases. Credit to sp3x of
SecurityReason.com.
- [47866] High Memory corruption in rendering code. Credit to Jose A.
Vazquez.
- [48284] High Memory corruption in SVG handling. Credit to Aki Helin of
OUSPG.
- [48597] Low Avoid hostname truncation and incorrect eliding. Credit to
Google Chrome Security Team (Inferno).
* lsb_release is slow so try to source the static file /etc/lsb-release
instead, and fallback to lsb_release if we didn't get the information we need
for about:version (LP: #608253). Thanks to pitti for the idea.
- update debian/chromium-browser.sh.in
-- Fabien Tassin <email address hidden> Tue, 27 Jul 2010 12:03:40 +0200
This bug was fixed in the package chromium-browser - 5.0.375. 125~r53311- 0ubuntu1
--------------- 125~r53311- 0ubuntu1) maverick; urgency=low
chromium-browser (5.0.375.
* New upstream release from the Stable Channel (LP: #612109) eason.com. chromium- browser. sh.in
This release fixes the following security issues:
- [42736] Medium Memory contents disclosure in layout code. Credit to
Michail Nikolaev.
- [43813] High Issue with large canvases. Credit to sp3x of
SecurityR
- [47866] High Memory corruption in rendering code. Credit to Jose A.
Vazquez.
- [48284] High Memory corruption in SVG handling. Credit to Aki Helin of
OUSPG.
- [48597] Low Avoid hostname truncation and incorrect eliding. Credit to
Google Chrome Security Team (Inferno).
* lsb_release is slow so try to source the static file /etc/lsb-release
instead, and fallback to lsb_release if we didn't get the information we need
for about:version (LP: #608253). Thanks to pitti for the idea.
- update debian/
-- Fabien Tassin <email address hidden> Tue, 27 Jul 2010 12:03:40 +0200