webkit2gtk_2.14.3-1_source.changes ACCEPTED into unstable
Debian FTP Masters
ftpmaster at ftp-master.debian.org
Wed Jan 18 09:50:08 UTC 2017
Accepted:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 18 Jan 2017 11:28:41 +0200
Source: webkit2gtk
Binary: libjavascriptcoregtk-4.0-18 libjavascriptcoregtk-4.0-dev libjavascriptcoregtk-4.0-bin gir1.2-javascriptcoregtk-4.0 libwebkit2gtk-4.0-37 libwebkit2gtk-4.0-dev libwebkit2gtk-4.0-doc gir1.2-webkit2-4.0 libwebkit2gtk-4.0-37-gtk2
Architecture: source
Version: 2.14.3-1
Distribution: unstable
Urgency: high
Maintainer: Debian WebKit Maintainers <pkg-webkit-maintainers at lists.alioth.debian.org>
Changed-By: Alberto Garcia <berto at igalia.com>
Description:
gir1.2-javascriptcoregtk-4.0 - JavaScript engine library from WebKitGTK+ - GObject introspection
gir1.2-webkit2-4.0 - Web content engine library for GTK+ - GObject introspection data
libjavascriptcoregtk-4.0-18 - JavaScript engine library from WebKitGTK+
libjavascriptcoregtk-4.0-bin - JavaScript engine library from WebKitGTK+ - command-line interpre
libjavascriptcoregtk-4.0-dev - JavaScript engine library from WebKitGTK+ - development files
libwebkit2gtk-4.0-37 - Web content engine library for GTK+
libwebkit2gtk-4.0-37-gtk2 - Web content engine library for GTK+ - GTK+2 plugin process
libwebkit2gtk-4.0-dev - Web content engine library for GTK+ - development files
libwebkit2gtk-4.0-doc - Web content engine library for GTK+ - documentation
Changes:
webkit2gtk (2.14.3-1) unstable; urgency=high
.
* New upstream release.
+ The WebKitGTK+ security advisory WSA-2017-0001 published along with
this release lists the following security fixes in the latest
versions of WebKitGTK+:
- CVE-2016-4743, CVE-2016-7587, CVE-2016-7598 (fixed in 2.14.0).
- CVE-2016-4692, CVE-2016-7610 (fixed in 2.14.1).
- CVE-2016-7611, CVE-2016-7640, CVE-2016-7642, CVE-2016-7646,
CVE-2016-7648, CVE-2016-7649 (fixed in 2.14.2)
- CVE-2016-7586, CVE-2016-7589, CVE-2016-7592, CVE-2016-7599,
CVE-2016-7623, CVE-2016-7632, CVE-2016-7635, CVE-2016-7639,
CVE-2016-7645, CVE-2016-7641, CVE-2016-7652, CVE-2016-7654,
CVE-2016-7656 (fixed in 2.14.3)
* Verify GPG signature of the upstream tarball:
+ debian/upstream/signing-key.asc:
- Add key file.
+ debian/watch:
- Add pgpsigurlmangle option.
* debian/rules:
+ Use the NEWS file as the upstream changelog.
Checksums-Sha1:
d17b4fe55ed5b182e65b5ef79b02c219c396ebd9 3556 webkit2gtk_2.14.3-1.dsc
b4a8c0a0ca52cfff311cde56d0f029acc5eab036 13962776 webkit2gtk_2.14.3.orig.tar.xz
92647c7bcad371d1a9027e0df0ade41a8ab53c66 55608 webkit2gtk_2.14.3-1.debian.tar.xz
Checksums-Sha256:
15991b2e4785f5373ba65b884f0b6b5f459fd65a8c8f60b6c1d1b9768562e9b1 3556 webkit2gtk_2.14.3-1.dsc
0bead450a4c92024f09008725bb3e8c3830a32c7e2983d566368c4fede9e106c 13962776 webkit2gtk_2.14.3.orig.tar.xz
dbebbaab932f98e35e44b583cb894ca5c4b2f53657f38e30f6fa75d49965274c 55608 webkit2gtk_2.14.3-1.debian.tar.xz
Files:
6b900b61890d083362831d98a2816343 3556 web optional webkit2gtk_2.14.3-1.dsc
cb08302a3e140f5487fe757262cf5267 13962776 web optional webkit2gtk_2.14.3.orig.tar.xz
e61d897352fd44c30e76494346a5bd26 55608 web optional webkit2gtk_2.14.3-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=EXVF
-----END PGP SIGNATURE-----
Thank you for your contribution to Debian.
More information about the Pkg-webkit-maintainers
mailing list