This bug was fixed in the package chromium-browser -
35.0.1916.153-0ubuntu1~pkg1029
---------------
chromium-browser (35.0.1916.153-0ubuntu1~pkg1029) utopic; urgency=medium
* Release to stage
chromium-browser (35.0.1916.153-0ubuntu1) UNRELEASED; urgency=low
* debian/patches/display-scaling-default-value: Make default scale 1:1
when no gsettings information is available. (LP: #1302155)
* debian/patches/title-bar-default-system.patch-v34: Make window
title-bar frame default to system-provided instead of custom. Again.
* debian/patches/fix-gyp-space-in-object-filename-exception.patch: Make
is deprecated, and not well supported, but we still need it.
* debian/chromium-browser.sh.in, debian/chromium-browser.dirs: Speed up
chromium startup by avoiding execution of unnecessary programs for real
this time, and also, add a place in /etc for other packages to hook into
chromium safely.
* debian/chromium-browser-customization-example,
debian/chromium-browser.sh.in: Add support for better customization of
chromium by other packages. Files in /etc/chromium-browser/customizations/
are sourced at startup time.
* debian/patches/notifications-nicer: Make buggy background-mode processes
off by default.
* 7-npapi-permission-not-defaults-to-unauthorized.patch: Fix misapplication.
Put inside linux test, not chromeos test.
* Upstream release 35.0.1916.153.
* Upstream release 34.0.1847.137:
- CVE-2014-1740: Use-after-free in WebSockets.
- CVE-2014-1741: Integer overflow in DOM ranges.
- CVE-2014-1742: Use-after-free in editing.
* Upstream release 35.0.1916.114:
- CVE-2014-1743: Use-after-free in styles.
- CVE-2014-1744: Integer overflow in audio.
- CVE-2014-1745: Use-after-free in SVG.
- CVE-2014-1746: Out-of-bounds read in media filters.
- CVE-2014-1747: UXSS with local MHTML file.
- CVE-2014-1748: UI spoofing with scrollbar.
- CVE-2014-1749: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-3152: Integer underflow in V8 fixed in version 3.25.28.16.
* debian/rules: Re-enable SSE for x86.
* debian/control: Add build-dep on libkrb5-dev.
* debian/patches/gyp-make-generator-reenabled.
* Reenable webapps patches 3,5,6,7.
* Remove old, unnecessary files, debian/cdbs, debian/cdbs/scons.mk,
debian/cdbs/tarball.mk, debian/enable-dist-patches.pl,
debian/keep-alive.sh
* Remove OS condition in webapps desktop integration patches. We know
the OS.
chromium-browser (34.0.1847.116-0ubuntu2) trusty; urgency=medium
* Don't recommend pepperflashplugin-nonfree, which is in multiverse. (LP:
#1307606)
chromium-browser (34.0.1847.116-0ubuntu1) trusty; urgency=low
* New upstream release 34.0.1847.116:
- CVE-2014-1716: UXSS in V8.
- CVE-2014-1717: OOB access in V8.
- CVE-2014-1718: Integer overflow in compositor.
- CVE-2014-1719: Use-after-free in web workers.
- CVE-2014-1720: Use-after-free in DOM.
- CVE-2014-1721: Memory corruption in V8.
- CVE-2014-1722: Use-after-free in rendering.
- CVE-2014-1723: Url confusion with RTL characters.
- CVE-2014-1724: Use-after-free in speech.
- CVE-2014-1725: OOB read with window property.
- CVE-2014-1726: Local cross-origin bypass.
- CVE-2014-1727: Use-after-free in forms.
- CVE-2014-1728: Various fixes from internal audits, fuzzing and other
initiatives.
- CVE-2014-1729: Multiple vulnerabilities in V8 fixed in version
3.24.35.22.
+ Now ignores "autocomplete=off" in web forms. (LP: #1294325)
* debian/rules: Enable high-DPI. Enable touch support. These require
using Aura toolkit.
* debian/patches/gsettings-display-scaling: Get scaling factor from
gsettings.
* debian/patches/touch: Enable touch on XInput2 slave pointer touch devices.
* debian/rules, debian/chromium-browser.sh.in: If lib dir contains a dir
matching our version, then use version dir as the new lib dir. This
is an attempto to mitigate version upgrade hangs.
* debian/chromium-browser.sh.in: Add a command line parameter to diasble
pinch gestures.
* debian/patches/display-scaling-default-value: Set default scaling to 1
on hardware, because hardware often lies, but should be recoverable at 1:1.
* debian/patches/display-scaling-report-hardware-info: Log hardware reports.
* debian/rules: Emit messages on a timer to prevent dumb build-bots from
killing long, silent linker stages.
* debian/control: Add libexif-dev, libgcrypt-dev to build-deps.
* debian/control: Drop Recommend x11-xserver-utils, x11-utils .
* debian/control: Add libexif-dev to build-deps.
* debian/apport/chromium-browser.py: Convert encoded bytes to str before
splitting. Converting these to str at all is wrong, though.
* debian/patches/flash-redirection: Redirect Flash installation through
Ubuntu wiki for better user experience.
* debian/patches/clipboard: Backport a few bug fixes.
* debian/patches/title-bar-default-system.patch-v34: Temporarily disable
system menu default to avoid window initial placement that doesn't take
into consideration the title bar.
-- Chad MILLER <[email protected]> Mon, 14 Jul 2014 14:01:49 -0400
** Changed in: chromium-browser (Ubuntu)
Status: Fix Committed => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1716
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1717
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1718
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1719
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1720
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1721
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1722
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1723
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1724
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1725
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1726
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1727
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1728
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1729
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1740
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1741
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1742
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1743
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1744
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1745
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1746
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1747
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1748
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1749
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3152
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302155
Title:
Chromium UI is very large
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1302155/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs