* New upstream release from the Stable Channel (LP: #992352)
- [106413] High CVE-2011-3078: Use after free in floats handling. Credit to
Google Chrome Security Team (Marty Barbella) and independent later
discovery by miaubiz.
- [117110] High CVE-2012-1521: Use after free in xml parser. Credit to
Google Chrome Security Team (SkyLined) and independent later discovery by
wushi of team509 reported through iDefense VCP (V-874rcfpq7z).
- [117627] Medium CVE-2011-3079: IPC validation failure. Credit to PinkiePie
- [121726] Medium CVE-2011-3080: Race condition in sandbox IPC. Credit to
Willem Pinckaers of Matasano.
- [121899] High CVE-2011-3081: Use after free in floats handling.
Credit to miaubiz.
-- Micah Gersten <email address hidden> Mon, 30 Apr 2012 23:41:25 -0500
This bug was fixed in the package chromium-browser - 18.0.1025. 168~r134367- 0ubuntu0. 11.10.1
--------------- 168~r134367- 0ubuntu0. 11.10.1) oneiric-security; urgency=low
chromium-browser (18.0.1025.
* New upstream release from the Stable Channel (LP: #992352)
- [106413] High CVE-2011-3078: Use after free in floats handling. Credit to
Google Chrome Security Team (Marty Barbella) and independent later
discovery by miaubiz.
- [117110] High CVE-2012-1521: Use after free in xml parser. Credit to
Google Chrome Security Team (SkyLined) and independent later discovery by
wushi of team509 reported through iDefense VCP (V-874rcfpq7z).
- [117627] Medium CVE-2011-3079: IPC validation failure. Credit to PinkiePie
- [121726] Medium CVE-2011-3080: Race condition in sandbox IPC. Credit to
Willem Pinckaers of Matasano.
- [121899] High CVE-2011-3081: Use after free in floats handling.
Credit to miaubiz.
-- Micah Gersten <email address hidden> Mon, 30 Apr 2012 23:41:25 -0500