This bug was fixed in the package chromium-browser -
11.0.696.57~r82915-0ubuntu0.10.04.1

---------------
chromium-browser (11.0.696.57~r82915-0ubuntu0.10.04.1) lucid-security; 
urgency=high

  * New Major upstream release from the Stable Channel (LP: #771935)
    This release fixes the following security issues:
    + WebKit issues:
      - [61502] High, CVE-2011-1303: Stale pointer in floating object handling.
        Credit to Scott Hess of the Chromium development community and Martin
        Barbella.
      - [70538] Low, CVE-2011-1304: Pop-up block bypass via plug-ins. Credit to
        Chamal De Silva.
      - [70589] Medium, CVE-2011-1305: Linked-list race in database handling.
        Credit to Kostya Serebryany of the Chromium development community.
      - [73526] High, CVE-2011-1437: Integer overflows in float rendering.
        Credit to miaubiz.
      - [74653] High, CVE-2011-1438: Same origin policy violation with blobs.
        Credit to kuzzcc.
      - [75186] High, CVE-2011-1440: Use-after-free with <ruby> tag and CSS.
        Credit to Jose A. Vazquez.
      - [75347] High, CVE-2011-1441: Bad cast with floating select lists.
        Credit to Michael Griffiths.
      - [75801] High, CVE-2011-1442: Corrupt node trees with mutation events.
        Credit to Sergey Glazunov and wushi of team 509.
      - [76001] High, CVE-2011-1443: Stale pointers in layering code. Credit to
        Martin Barbella.
      - [76646] Medium, CVE-2011-1445: Out-of-bounds read in SVG. Credit to
        wushi of team509.
      - [76666] [77507] [78031] High, CVE-2011-1446: Possible URL bar spoofs
        with navigation errors and interrupted loads. Credit to kuzzcc.
      - [76966] High, CVE-2011-1447: Stale pointer in drop-down list handling.
        Credit to miaubiz.
      - [77130] High, CVE-2011-1448: Stale pointer in height calculations.
        Credit to wushi of team509.
      - [77346] High, CVE-2011-1449: Use-after-free in WebSockets. Credit to
        Marek Majkowski.
      - [77463] High, CVE-2011-1451: Dangling pointers in DOM id map. Credit to
        Sergey Glazunov.
      - [79199] High, CVE-2011-1454: Use-after-free in DOM id handling. Credit
        to Sergey Glazunov.
    + Chromium issues:
      - [71586] Medium, CVE-2011-1434: Lack of thread safety in MIME handling.
        Credit to Aki Helin.
      - [72523] Medium, CVE-2011-1435: Bad extension with ‘tabs’ permission can
        capture local files. Credit to Cole Snodgrass.
      - [72910] Low, CVE-2011-1436: Possible browser crash due to bad
        interaction with X. Credit to miaubiz.
      - [76542] High, CVE-2011-1444: Race condition in sandbox launcher. Credit
        to Dan Rosenberg.
      - [77349] Low, CVE-2011-1450: Dangling pointers in file dialogs. Credit
        to kuzzcc.
      - [77786] Medium, CVE-2011-1452: URL bar spoof with redirect and manual
        reload. Credit to Jordi Chancel.
      - [74763] High, CVE-2011-1439: Prevent interference between renderer
        processes. Credit to Julien Tinnes of the Google Security Team.
  * Fix the password store regression from the last Chromium 10 update.
    Backport from trunk provided by Elliot Glaysher from upstream (LP: #743494)
    - add debian/patches/stored_passwords_lp743494.patch
    - update debian/patches/series
  * Update the SVG logo to match the new simplified 2D logo (LP: #748881)
    - update debian/chromium-browser.svg
  * Ship the app icon in all the sizes provided upstream
    - update debian/rules
  * Add libpam0g-dev to Build-depends, needed by "Chromoting"
    - update debian/control
  * Enable the new use_third_party_translations flag at build time (it enables
    the Launchpad translations already used in Ubuntu since Chromium 8)
    - update debian/rules
 -- Fabien Tassin <f...@ubuntu.com>   Wed, 27 Apr 2011 17:31:35 +0200

** Changed in: chromium-browser (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1303

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1304

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1305

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1434

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1435

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1436

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1437

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1438

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1439

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1440

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1441

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1442

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1443

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1444

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1445

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1446

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1447

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1448

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1449

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1450

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1451

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1452

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1454

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/748881

Title:
  Update SVG logo

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to