This bug was fixed in the package chromium-browser - 11.0.696.57~r82915-0ubuntu0.10.04.1
--------------- chromium-browser (11.0.696.57~r82915-0ubuntu0.10.04.1) lucid-security; urgency=high * New Major upstream release from the Stable Channel (LP: #771935) This release fixes the following security issues: + WebKit issues: - [61502] High, CVE-2011-1303: Stale pointer in floating object handling. Credit to Scott Hess of the Chromium development community and Martin Barbella. - [70538] Low, CVE-2011-1304: Pop-up block bypass via plug-ins. Credit to Chamal De Silva. - [70589] Medium, CVE-2011-1305: Linked-list race in database handling. Credit to Kostya Serebryany of the Chromium development community. - [73526] High, CVE-2011-1437: Integer overflows in float rendering. Credit to miaubiz. - [74653] High, CVE-2011-1438: Same origin policy violation with blobs. Credit to kuzzcc. - [75186] High, CVE-2011-1440: Use-after-free with <ruby> tag and CSS. Credit to Jose A. Vazquez. - [75347] High, CVE-2011-1441: Bad cast with floating select lists. Credit to Michael Griffiths. - [75801] High, CVE-2011-1442: Corrupt node trees with mutation events. Credit to Sergey Glazunov and wushi of team 509. - [76001] High, CVE-2011-1443: Stale pointers in layering code. Credit to Martin Barbella. - [76646] Medium, CVE-2011-1445: Out-of-bounds read in SVG. Credit to wushi of team509. - [76666] [77507] [78031] High, CVE-2011-1446: Possible URL bar spoofs with navigation errors and interrupted loads. Credit to kuzzcc. - [76966] High, CVE-2011-1447: Stale pointer in drop-down list handling. Credit to miaubiz. - [77130] High, CVE-2011-1448: Stale pointer in height calculations. Credit to wushi of team509. - [77346] High, CVE-2011-1449: Use-after-free in WebSockets. Credit to Marek Majkowski. - [77463] High, CVE-2011-1451: Dangling pointers in DOM id map. Credit to Sergey Glazunov. - [79199] High, CVE-2011-1454: Use-after-free in DOM id handling. Credit to Sergey Glazunov. + Chromium issues: - [71586] Medium, CVE-2011-1434: Lack of thread safety in MIME handling. Credit to Aki Helin. - [72523] Medium, CVE-2011-1435: Bad extension with ‘tabs’ permission can capture local files. Credit to Cole Snodgrass. - [72910] Low, CVE-2011-1436: Possible browser crash due to bad interaction with X. Credit to miaubiz. - [76542] High, CVE-2011-1444: Race condition in sandbox launcher. Credit to Dan Rosenberg. - [77349] Low, CVE-2011-1450: Dangling pointers in file dialogs. Credit to kuzzcc. - [77786] Medium, CVE-2011-1452: URL bar spoof with redirect and manual reload. Credit to Jordi Chancel. - [74763] High, CVE-2011-1439: Prevent interference between renderer processes. Credit to Julien Tinnes of the Google Security Team. * Fix the password store regression from the last Chromium 10 update. Backport from trunk provided by Elliot Glaysher from upstream (LP: #743494) - add debian/patches/stored_passwords_lp743494.patch - update debian/patches/series * Update the SVG logo to match the new simplified 2D logo (LP: #748881) - update debian/chromium-browser.svg * Ship the app icon in all the sizes provided upstream - update debian/rules * Add libpam0g-dev to Build-depends, needed by "Chromoting" - update debian/control * Enable the new use_third_party_translations flag at build time (it enables the Launchpad translations already used in Ubuntu since Chromium 8) - update debian/rules -- Fabien Tassin <f...@ubuntu.com> Wed, 27 Apr 2011 17:31:35 +0200 ** Changed in: chromium-browser (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1303 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1304 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1305 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1434 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1435 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1436 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1437 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1438 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1439 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1440 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1441 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1442 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1443 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1444 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1445 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1446 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1447 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1448 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1449 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1450 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1451 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1452 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2011-1454 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/743494 Title: Did not store passwords -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs