Package "chromium-codecs-ffmpeg-dbg"

This package belongs to a PPA: Chromium Stable Channel

Name: chromium-codecs-ffmpeg-dbg


chromium-codecs-ffmpeg debug symbols
Debug symbols for the free ffmpeg-mt codecs

Latest version: 30.0.1599.114-0ubuntu0.12.04.4~cm0precise
Release: precise (12.04)
Level: base
Repository: main
Head package: chromium-browser


Download "chromium-codecs-ffmpeg-dbg"

Other versions of "chromium-codecs-ffmpeg-dbg" in Precise

Repository Area Version
base universe 18.0.1025.151~r130497-0ubuntu1
security universe 37.0.2062.120-0ubuntu0.12.04.4
updates universe 37.0.2062.120-0ubuntu0.12.04.4
PPA: WebApps Preview 20.0.1132.47~r144678-0precise1+webapps7


Version: 30.0.1599.114-0ubuntu0.12.04.4~cm0precise 2013-11-08 01:07:39 UTC

 chromium-browser (30.0.1599.114-0ubuntu0.12.04.4~cm0precise) precise; urgency=low
   * debian/patches/menu-bar-visible.patch: Don't treat object as object
   * debian/patches/4-chromeless-window-launch-option.patch: Don't fix problem
     introduced in menu-bar-visible patch.
   * debian/rules: Fix typo of Precise conditional.
   * debian/patches/cr30-sandbox-async-signal-safe.patch: Backport to make
     SIGSYS handler in sandbox safe and never call itself. (LP: #1195797)
   * debian/rules, debian/control: Use standard hardening flags, not
   * debian/control: Build-depend on binutils, which already includes gold
   * debian/control: Drop some unused build-deps: autotools-dev, binutils,
        flex, g++-multilib [amd64], libbz2-dev, libc6-dev-i386 [amd64],
        libdbus-glib-1-dev, libgl1-mesa-dev, libgl1-mesa-dri, libglib2.0-dev,
        libglu1-mesa-dev, libhunspell-dev, libjpeg-dev, libnspr4-dev,
        libpam0g-dev, libpango1.0-dev, libspeechd-dev, libssl-dev, libxi-dev,
        libxml2-dev, libxslt1-dev, libxt-dev, mesa-common-dev,
        patchutils (>= 0.2.25), python-simplejson, yasm zlib1g-dev,
   * debian/patches/cr31-pango-tab-titles.patch: Backport a fix that makes
     tab titles disappear due to a pango bug.
   * debian/tests/control: Drop Depends on obselete package

Source diff to previous version

Version: 29.0.1547.57-0ubuntu0~cm4 2013-08-27 04:08:59 UTC

 chromium-browser (29.0.1547.57-0ubuntu0~cm4) precise; urgency=low
   * New release 29.0.1547.57: (LP: #1215361)
     - CVE-2013-2900: Incomplete path sanitization in file handling.
     - CVE-2013-2905: Information leak via overly broad permissions on shared
       memory files.
     - CVE-2013-2901: Integer overflow in ANGLE.
     - CVE-2013-2902: Use after free in XSLT.
     - CVE-2013-2903: Use after free in media element.
     - CVE-2013-2904: Use after free in document parsing.
     - CVE-2013-2887: Various fixes from internal audits, fuzzing and other
       initiatives (Chrome 29).
   * debian/rules: Fix packaging-sanity test.
   * debian/patches/search-credit.patch: Update URLs.
   * debian/patches/disable_dlog_and_dcheck_in_release_builds.patch,
       No longer necessary. Deleted.
   * debian/chromium-browser.sh.in: Include command-line parameters for
     registered plugins.
   * Since we include remoting locales too, also split its locales info
     into the -l10n package correctly.
   * debian/rules:
     - Make unused-file matches simpler, and install rule more descriptive.
     - get-orig-source has to make the directory for the orig contents.
   * debian/source/lintian-overrides:
     - Add old-fsf-address-in-copyright-file and image-file-in-usr-lib
     - Fix setuid-binary to be "source". Seems like it should be "binary". :(
   * debian/checkout-orig-source.mk: Remove tests and add unofficialness
     marker file to orig tarball when we can't use upstream orig releases.

Source diff to previous version
1215361 Please update to 29.0.1547.57
CVE-2013-2900 The FilePath::ReferencesParent function in files/file_path.cc in ...
CVE-2013-2905 The SharedMemory::Create function in memory/shared_memory_posix.cc in ...
CVE-2013-2901 Multiple integer overflows in (1) libGLESv2/renderer/Renderer9.cpp and ...
CVE-2013-2902 Use-after-free vulnerability in the XSLT ProcessingInstruction ...
CVE-2013-2903 Use-after-free vulnerability in the ...
CVE-2013-2904 Use-after-free vulnerability in the Document::finishedParsing function ...
CVE-2013-2887 Multiple unspecified vulnerabilities in Google Chrome before ...

Version: 28.0.1500.71-0ubuntu1.12.04.1 2013-07-19 05:09:32 UTC

 chromium-browser (28.0.1500.71-0ubuntu1.12.04.1) precise-security; urgency=low
   * New release 28.0.1500.71.
   * debian/chromium-browser.install: Include inspector resources in
     chromium-browser package.
   * debian/rules:
     - Remove tests for ancient versions of Ubuntu.
     - Return to using no explicity NEON fpu, and instead try to detect at
       runtime NEON caps. This effectively disables NEON, so far.
     - Build and run unit test suite as part of making a package. Abort if
       more than 15 out of ~1000 tests fail.
     - Clean up packaging sanity test that verifies everything we build is
       put into a package.
     - Set relative rpath to libs/ for chromium-browser executable, but . for
       libraries in libs/ ; that makes dpkg-shlibdeps happy and process run.
     - Strip out some ugly logic around keeping only one language in the main
       package, and keeping the contents verifier happy based on the
     - EXPERIMENT: Try not stripping enormous libraries' symbols explicitly.
     - Add more exceptions for packaging contents tests, this time to exclude
       files that are in package but not from the build tree.
     - Be more explicit about what files we set the rpath on. Get all
       executables. We missed chromedriver before.
     - Only one hardware arch builds the independent files, so in our sanity
       test that we install everything upstream built once and only once in
       packages, we have to consider whether this build didn't even try to
       take and use arch-independent files. Don't look for some file paths if
       we don't use them. (Also, if we match too much of what we used, also
       remove matches from the list of created. This should be better.)
   * debian/patches/arm-neon.patch:
     - Compile in NEON instructions for ARM, even if we can't reliably check for
       whether our CPU is capable of running them yet. The major problem
       remaining is that the sandbox security wrapper defeats any test of
       /proc/cpuinfo .
   * debian/source/lintian-overrides:
     - Supress warnings about known intentional decisions: Package name,
       statically linked bundled libraries, setuid root sandbox.
   * debian/chromium-browser.sh.in:
     - Detect at startup the features of the CPU that we might be intersted
       in and export info into the environment. This is step one of a longer
       workaround for sandbox /proc restrictions.
   * Make a fall-back for when upstream fails to release a Release. Package up
     as best we can from source control. debian/rules and
     debian/checkout-orig-source.mk .
   * debian/tests/:
     - Add smoketest to verify that chromium runs.
     - Add a empty webapps test file for notes about what parts of webapps will
       or should be tested.
   * debian/keep-alive.sh. Quit if disk environment disappears.
   * debian/chromium-browser.install
     - Conform to newer Ayatana standard for Desktop Actions.
   * Release to PPA.

Source diff to previous version

Version: 28.0.1500.71-0ubuntu1.12.04.1~cm0precise 2013-07-17 05:09:40 UTC

 chromium-browser (28.0.1500.71-0ubuntu1.12.04.1~cm0precise) precise; urgency=low
   * Set version for PPA 'precise'

Source diff to previous version

Version: 18.0.1025.168~r134367-0ubuntu0.12.04.1 2012-05-01 10:09:55 UTC

 chromium-browser (18.0.1025.168~r134367-0ubuntu0.12.04.1) precise-security; urgency=low
   * New upstream release from the Stable Channel (LP: #992352)
     - [106413] High CVE-2011-3078: Use after free in floats handling. Credit to
       Google Chrome Security Team (Marty Barbella) and independent later
       discovery by miaubiz.
     - [117110] High CVE-2012-1521: Use after free in xml parser. Credit to
       Google Chrome Security Team (SkyLined) and independent later discovery by
       wushi of team509 reported through iDefense VCP (V-874rcfpq7z).
     - [117627] Medium CVE-2011-3079: IPC validation failure. Credit to PinkiePie
     - [121726] Medium CVE-2011-3080: Race condition in sandbox IPC. Credit to
       Willem Pinckaers of Matasano.
     - [121899] High CVE-2011-3081: Use after free in floats handling.
       Credit to miaubiz.

992352 Please update to 18.0.1025.168
CVE-2011-3078 RESERVED
CVE-2012-1521 RESERVED
CVE-2011-3079 RESERVED
CVE-2011-3080 RESERVED
CVE-2011-3081 RESERVED

About   -   Send Feedback to @ubuntu_updates