chromium-browser_37.0.2062.120-1~deb7u1_all.deb


Advertisement

Description

chromium-browser - Chromium browser - transitional dummy package

Property Value
Distribution Debian 7 (Wheezy)
Repository Debian Security Updates Main amd64
Package name chromium-browser
Package version 37.0.2062.120
Package release 1~deb7u1
Package architecture all
Package type deb
Installed size 1.65 KB
Download size 167.51 KB
Official Mirror ftp.br.debian.org
Description -

Alternatives

Package Version Architecture Repository
chromium-browser_37.0.2062.120-1~deb7u1_all.deb 37.0.2062.120 all Debian Security Updates Main
chromium-browser_37.0.2062.120-1~deb7u1_all.deb 37.0.2062.120 all Debian Main
chromium-browser_37.0.2062.120-1~deb7u1_all.deb 37.0.2062.120 all Debian Main
chromium-browser - - -

Requires

Name Value
chromium >= 10

Replaces

Name Value
chromium << 13.0.782.215~r97094-1

Download

Type URL
Binary Package chromium-browser_37.0.2062.120-1~deb7u1_all.deb
Source Package chromium-browser

Install Howto

  1. Update the package index:
    # sudo apt-get update
  2. Install chromium-browser deb package:
    # sudo apt-get install chromium-browser

Changelog

2014-09-23 - Michael Gilbert <mgilbert@debian.org>
chromium-browser (37.0.2062.120-1~deb7u1) stable-security; urgency=high
* New upstream stable release:
- CVE-2014-3160: Same-Origin-Policy bypass in SVG. Credit to Christian
Schneider.
- CVE-2014-3162: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-3165: Use-after-free in web sockets. Credit to Collin Payne.
- CVE-2014-3166: Information disclosure in SPDY. Credit to Antoine
Delignat-Lavaud.
- CVE-2014-3167: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-3168: Use-after-free in SVG. Credit to cloudfuzzer.
- CVE-2014-3169: Use-after-free in DOM. Credit to Andrzej Dyjak.
- CVE-2014-3170: Extension permission dialog spoofing. Credit to Rob Wu.
- CVE-2014-3171: Use-after-free in bindings. Credit to cloudfuzzer.
- CVE-2014-3172: Issue related to extension debugging. Credit to Eli Grey.
- CVE-2014-3173: Uninitialized memory read in WebGL. Credit to jmuizelaar.
- CVE-2014-3174: Uninitialized memory read in Web Audio. Credit to Atte
Kettunen from OUSPG.
- CVE-2014-3175: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-3176: A special reward to lokihardt@asrt for a combination of
bugs in V8, IPC, sync, and extensions that can lead to remote code
execution outside of the sandbox.
- CVE-2014-3177: A special reward to lokihardt@asrt for a combination of
bugs in V8, IPC, sync, and extensions that can lead to remote code
execution outside of the sandbox.
- CVE-2014-3178: Use-after-free in rendering. Credit to miaubiz.
- CVE-2014-3179: Various fixes from internal audits, fuzzing and other
initiatives.
2014-06-13 - Michael Gilbert <mgilbert@debian.org>
chromium-browser (35.0.1916.153-1~deb7u1) stable-security; urgency=high
* New upstream stable release:
- CVE-2014-3154: Use-after-free in filesystem api. Credit to Collin Payne.
- CVE-2014-3155: Out-of-bounds read in SPDY. Credit to James March, Daniel
Sommermann and Alan Frindell of Facebook.
- CVE-2014-3156: Buffer overflow in clipboard. Credit to Atte Kettunen.
- CVE-2014-3157: Heap overflow in media.
* Don't set sse2 compiler flags on i386 (closes: #750361).
2014-05-30 - Michael Gilbert <mgilbert@debian.org>
chromium-browser (35.0.1916.114-1~deb7u2) stable-security; urgency=high
* Add flags to avoid memory allocation issues while linking on i386.
2014-05-25 - Michael Gilbert <mgilbert@debian.org>
chromium-browser (35.0.1916.114-1~deb7u1) stable-security; urgency=high
* New upstream stable release:
- CVE-2014-1743: Use-after-free in styles. Credit to cloudfuzzer.
- CVE-2014-1744: Integer overflow in audio. Credit to Aaron Staple.
- CVE-2014-1745: Use-after-free in SVG. Credit to Atte Kettunen.
- CVE-2014-1746: Out-of-bounds read in media filters. Credit to
Holger Fuhrmannek.
- CVE-2014-1747: UXSS with local MHTML file. Credit to packagesu.
- CVE-2014-1748: UI spoofing with scrollbar. Credit to Jordan Milne.
- CVE-2014-1749: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-3152: Integer underflow in V8 fixed in version 3.25.28.16.
2014-05-17 - Michael Gilbert <mgilbert@debian.org>
chromium-browser (34.0.1847.137-1~deb7u1) stable-security; urgency=high
* New upstream stable release:
- High CVE-2014-1740: Use-after-free in WebSockets. Credit to Collin
Payne.
- High CVE-2014-1741: Integer overflow in DOM ranges. Credit to John
Butler.
- High CVE-2014-1742: Use-after-free in editing. Credit to cloudfuzzer.

See Also

Package Description
chromium-inspector_37.0.2062.120-1~deb7u1_all.deb page inspector for the chromium browser
chromium-l10n_37.0.2062.120-1~deb7u1_all.deb chromium-browser language packages
chromium_37.0.2062.120-1~deb7u1_amd64.deb Google's open source chromium web browser
chrony_1.24-3.1+deb7u4_amd64.deb Sets your computer's clock from time servers on the Net
clamav-base_0.99.4+dfsg-1+deb7u1_all.deb anti-virus utility for Unix - base package
clamav-daemon_0.99.4+dfsg-1+deb7u1_amd64.deb anti-virus utility for Unix - scanner daemon
clamav-docs_0.99.4+dfsg-1+deb7u1_all.deb anti-virus utility for Unix - documentation
clamav-freshclam_0.99.4+dfsg-1+deb7u1_amd64.deb anti-virus utility for Unix - virus database update utility
clamav-milter_0.99.4+dfsg-1+deb7u1_amd64.deb anti-virus utility for Unix - sendmail integration
clamav-testfiles_0.99.4+dfsg-1+deb7u1_all.deb anti-virus utility for Unix - test files
clamav_0.99.4+dfsg-1+deb7u1_amd64.deb anti-virus utility for Unix - command-line interface
claws-mail-bogofilter_3.8.1-2+deb7u1_amd64.deb Bogofilter plugin for Claws Mail
claws-mail-doc_3.8.1-2+deb7u1_all.deb User documentation for Claws Mail mailer
claws-mail-i18n_3.8.1-2+deb7u1_all.deb Locale data for Claws Mail (i18n support)
claws-mail-pgpinline_3.8.1-2+deb7u1_amd64.deb PGP/inline plugin for Claws Mail
Advertisement
Advertisement