This bug was fixed in the package chromium-browser - 35.0.1916.153-0ubuntu1~pkg1029
--------------- chromium-browser (35.0.1916.153-0ubuntu1~pkg1029) utopic; urgency=medium * Release to stage chromium-browser (35.0.1916.153-0ubuntu1) UNRELEASED; urgency=low * debian/patches/display-scaling-default-value: Make default scale 1:1 when no gsettings information is available. (LP: #1302155) * debian/patches/title-bar-default-system.patch-v34: Make window title-bar frame default to system-provided instead of custom. Again. * debian/patches/fix-gyp-space-in-object-filename-exception.patch: Make is deprecated, and not well supported, but we still need it. * debian/chromium-browser.sh.in, debian/chromium-browser.dirs: Speed up chromium startup by avoiding execution of unnecessary programs for real this time, and also, add a place in /etc for other packages to hook into chromium safely. * debian/chromium-browser-customization-example, debian/chromium-browser.sh.in: Add support for better customization of chromium by other packages. Files in /etc/chromium-browser/customizations/ are sourced at startup time. * debian/patches/notifications-nicer: Make buggy background-mode processes off by default. * 7-npapi-permission-not-defaults-to-unauthorized.patch: Fix misapplication. Put inside linux test, not chromeos test. * Upstream release 35.0.1916.153. * Upstream release 34.0.1847.137: - CVE-2014-1740: Use-after-free in WebSockets. - CVE-2014-1741: Integer overflow in DOM ranges. - CVE-2014-1742: Use-after-free in editing. * Upstream release 35.0.1916.114: - CVE-2014-1743: Use-after-free in styles. - CVE-2014-1744: Integer overflow in audio. - CVE-2014-1745: Use-after-free in SVG. - CVE-2014-1746: Out-of-bounds read in media filters. - CVE-2014-1747: UXSS with local MHTML file. - CVE-2014-1748: UI spoofing with scrollbar. - CVE-2014-1749: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2014-3152: Integer underflow in V8 fixed in version 3.25.28.16. * debian/rules: Re-enable SSE for x86. * debian/control: Add build-dep on libkrb5-dev. * debian/patches/gyp-make-generator-reenabled. * Reenable webapps patches 3,5,6,7. * Remove old, unnecessary files, debian/cdbs, debian/cdbs/scons.mk, debian/cdbs/tarball.mk, debian/enable-dist-patches.pl, debian/keep-alive.sh * Remove OS condition in webapps desktop integration patches. We know the OS. chromium-browser (34.0.1847.116-0ubuntu2) trusty; urgency=medium * Don't recommend pepperflashplugin-nonfree, which is in multiverse. (LP: #1307606) chromium-browser (34.0.1847.116-0ubuntu1) trusty; urgency=low * New upstream release 34.0.1847.116: - CVE-2014-1716: UXSS in V8. - CVE-2014-1717: OOB access in V8. - CVE-2014-1718: Integer overflow in compositor. - CVE-2014-1719: Use-after-free in web workers. - CVE-2014-1720: Use-after-free in DOM. - CVE-2014-1721: Memory corruption in V8. - CVE-2014-1722: Use-after-free in rendering. - CVE-2014-1723: Url confusion with RTL characters. - CVE-2014-1724: Use-after-free in speech. - CVE-2014-1725: OOB read with window property. - CVE-2014-1726: Local cross-origin bypass. - CVE-2014-1727: Use-after-free in forms. - CVE-2014-1728: Various fixes from internal audits, fuzzing and other initiatives. - CVE-2014-1729: Multiple vulnerabilities in V8 fixed in version 3.24.35.22. + Now ignores "autocomplete=off" in web forms. (LP: #1294325) * debian/rules: Enable high-DPI. Enable touch support. These require using Aura toolkit. * debian/patches/gsettings-display-scaling: Get scaling factor from gsettings. * debian/patches/touch: Enable touch on XInput2 slave pointer touch devices. * debian/rules, debian/chromium-browser.sh.in: If lib dir contains a dir matching our version, then use version dir as the new lib dir. This is an attempto to mitigate version upgrade hangs. * debian/chromium-browser.sh.in: Add a command line parameter to diasble pinch gestures. * debian/patches/display-scaling-default-value: Set default scaling to 1 on hardware, because hardware often lies, but should be recoverable at 1:1. * debian/patches/display-scaling-report-hardware-info: Log hardware reports. * debian/rules: Emit messages on a timer to prevent dumb build-bots from killing long, silent linker stages. * debian/control: Add libexif-dev, libgcrypt-dev to build-deps. * debian/control: Drop Recommend x11-xserver-utils, x11-utils . * debian/control: Add libexif-dev to build-deps. * debian/apport/chromium-browser.py: Convert encoded bytes to str before splitting. Converting these to str at all is wrong, though. * debian/patches/flash-redirection: Redirect Flash installation through Ubuntu wiki for better user experience. * debian/patches/clipboard: Backport a few bug fixes. * debian/patches/title-bar-default-system.patch-v34: Temporarily disable system menu default to avoid window initial placement that doesn't take into consideration the title bar. -- Chad MILLER <chad.mil...@canonical.com> Mon, 14 Jul 2014 14:01:49 -0400 ** Changed in: chromium-browser (Ubuntu) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1716 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1717 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1718 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1719 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1720 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1721 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1722 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1723 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1724 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1725 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1726 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1727 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1728 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1729 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1740 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1741 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1742 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1743 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1744 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1745 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1746 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1747 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1748 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-1749 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3152 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1302155 Title: Chromium UI is very large To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1302155/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs