[ Fabien Tassin <email address hidden> ]
* New upstream release from the Stable Channel (LP: #794197)
It includes:
- Hardware accelerated 3D CSS
- New Safe Browsing protection against downloading malicious files
- Integrated Sync into new settings pages
This release fixes the following security issues:
+ WebKit issues:
- [73962] [79746] High CVE-2011-1808: Use-after-free due to integer
issues in float handling. Credit to miaubiz.
- [75496] Medium CVE-2011-1809: Use-after-free in accessibility support.
Credit to Google Chrome Security Team (SkyLined).
- [75643] Low CVE-2011-1810: Visit history information leak in CSS.
Credit to Jesse Mohrland of Microsoft and Microsoft Vulnerability
Research (MSVR).
- [80358] Medium CVE-2011-1816: Use-after-free in developer tools. Credit
to kuzzcc.
- [81949] High CVE-2011-1818: Use-after-free in image loader. Credit to
miaubiz.
- [83743] High CVE-2011-2342: Same origin bypass in DOM. Credit to Sergey
Glazunov.
+ Chromium issues:
- [76034] Low CVE-2011-1811: Browser crash with lots of form submissions.
Credit to “DimitrisV22”.
- [77026] Medium CVE-2011-1812: Extensions permission bypass. Credit to
kuzzcc.
- [78516] High CVE-2011-1813: Stale pointer in extension framework.
Credit to Google Chrome Security Team (Inferno).
- [79862] Low CVE-2011-1815: Extension script injection into new tab
page. Credit to kuzzcc.
- [81916] Medium CVE-2011-1817: Browser memory corruption in history
deletion. Credit to Collin Payne.
- [83010] Medium CVE-2011-1819: Extension injection into chrome:// pages.
Credit to Vladislavas Jarmalis, plus subsequent independent discovery
by Sergey Glazunov.
- [83275] High CVE-2011-2332: Same origin bypass in v8. Credit to Sergey
Glazunov.
* Drop the stored passwords patch (fixed upstream)
- remove debian/patches/stored_passwords_lp743494.patch
- update debian/patches/series
* Empty the -inspector package now that it has been merged into the main
resources.pak file (so that the Inspector remains usable after an upgrade
until the next browser restart). Also remove the resources directory,
now empty
- remove debian/chromium-browser-inspector.install
- update debian/chromium-browser.dirs
- update debian/rules
* Update the location of the app_strings templates
- update debian/rules
* Don't build with libjpeg-turbo on armel, to prevent a FTBFS
- update debian/rules
* Rebase the GL dlopen patch
- update debian/patches/dlopen_sonamed_gl.patch
[ Micah Gersten <email address hidden> ]
* Don't have chromium-browser depend on chromium-browser-inspector anymore
it's now a transitional package; Change text of chromium-browser-inspector
to reflect its transitional nature
- update debian/control
* Re-enable armel builds
- update debian/control
-- Micah Gersten <email address hidden> Tue, 07 Jun 2011 19:19:02 -0500
This bug was fixed in the package chromium-browser - 12.0.742. 91~r87961- 0ubuntu0. 10.10.1
--------------- 91~r87961- 0ubuntu0. 10.10.1) maverick-security; urgency=low
chromium-browser (12.0.742.
[ Fabien Tassin <email address hidden> ] patches/ stored_ passwords_ lp743494. patch patches/ series chromium- browser- inspector. install chromium- browser. dirs patches/ dlopen_ sonamed_ gl.patch
* New upstream release from the Stable Channel (LP: #794197)
It includes:
- Hardware accelerated 3D CSS
- New Safe Browsing protection against downloading malicious files
- Integrated Sync into new settings pages
This release fixes the following security issues:
+ WebKit issues:
- [73962] [79746] High CVE-2011-1808: Use-after-free due to integer
issues in float handling. Credit to miaubiz.
- [75496] Medium CVE-2011-1809: Use-after-free in accessibility support.
Credit to Google Chrome Security Team (SkyLined).
- [75643] Low CVE-2011-1810: Visit history information leak in CSS.
Credit to Jesse Mohrland of Microsoft and Microsoft Vulnerability
Research (MSVR).
- [80358] Medium CVE-2011-1816: Use-after-free in developer tools. Credit
to kuzzcc.
- [81949] High CVE-2011-1818: Use-after-free in image loader. Credit to
miaubiz.
- [83743] High CVE-2011-2342: Same origin bypass in DOM. Credit to Sergey
Glazunov.
+ Chromium issues:
- [76034] Low CVE-2011-1811: Browser crash with lots of form submissions.
Credit to “DimitrisV22”.
- [77026] Medium CVE-2011-1812: Extensions permission bypass. Credit to
kuzzcc.
- [78516] High CVE-2011-1813: Stale pointer in extension framework.
Credit to Google Chrome Security Team (Inferno).
- [79862] Low CVE-2011-1815: Extension script injection into new tab
page. Credit to kuzzcc.
- [81916] Medium CVE-2011-1817: Browser memory corruption in history
deletion. Credit to Collin Payne.
- [83010] Medium CVE-2011-1819: Extension injection into chrome:// pages.
Credit to Vladislavas Jarmalis, plus subsequent independent discovery
by Sergey Glazunov.
- [83275] High CVE-2011-2332: Same origin bypass in v8. Credit to Sergey
Glazunov.
* Drop the stored passwords patch (fixed upstream)
- remove debian/
- update debian/
* Empty the -inspector package now that it has been merged into the main
resources.pak file (so that the Inspector remains usable after an upgrade
until the next browser restart). Also remove the resources directory,
now empty
- remove debian/
- update debian/
- update debian/rules
* Update the location of the app_strings templates
- update debian/rules
* Don't build with libjpeg-turbo on armel, to prevent a FTBFS
- update debian/rules
* Rebase the GL dlopen patch
- update debian/
[ Micah Gersten <email address hidden> ] browser- inspector anymore browser- inspector
* Don't have chromium-browser depend on chromium-
it's now a transitional package; Change text of chromium-
to reflect its transitional nature
- update debian/control
* Re-enable armel builds
- update debian/control
-- Micah Gersten <email address hidden> Tue, 07 Jun 2011 19:19:02 -0500