after opening webapps window and a normal window, normal window doesn't respond to Ctrl-T
Bug #1223855 reported by
Chad Miller
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
chromium-browser (Ubuntu) |
Fix Released
|
Undecided
|
Chad Miller |
Bug Description
chromium-browser 29.0.1547.
Open a window as webapps icon does:
chromium-browser --chromeless --new-window https:/
and leave it open. Open a new window normally
chromium-browser
and hit Ctrl-T. It should open a new tab. It doesn't.
CVE References
- 2013-2881
- 2013-2882
- 2013-2883
- 2013-2884
- 2013-2885
- 2013-2886
- 2013-2887
- 2013-2900
- 2013-2901
- 2013-2902
- 2013-2903
- 2013-2904
- 2013-2905
- 2013-2906
- 2013-2907
- 2013-2908
- 2013-2909
- 2013-2910
- 2013-2911
- 2013-2912
- 2013-2913
- 2013-2914
- 2013-2915
- 2013-2916
- 2013-2917
- 2013-2918
- 2013-2919
- 2013-2920
- 2013-2921
- 2013-2922
- 2013-2923
- 2013-2924
- 2013-2925
- 2013-2926
- 2013-2927
Changed in chromium-browser (Ubuntu): | |
assignee: | nobody → Chad Miller (cmiller) |
To post a comment you must log in.
This bug was fixed in the package chromium-browser - 30.0.1599. 114-0ubuntu0. 13.10.2
--------------- 114-0ubuntu0. 13.10.2) saucy-security; urgency=low
chromium-browser (30.0.1599.
* Test the compiler for "-m32" support as the canonical test of support.
Only a problem on ARM.
chromium-browser (30.0.1599. 114-0ubuntu0. 13.10.1) saucy-updates; urgency=low
* New release 30.0.1599.114. patches/ 4-chromeless- window- launch- option. patch: Make new windows patches/ series: Drop comment references to old patches. Remove chromium- browser. install: Handle sandbox compilation testing/ driver: Cheap run test to make sure chromedriver runs. patches/ 4-chromeless- window- launch- option. patch: Fix syntax that
* New release 30.0.1599.101:
- CVE-2013-2925: Use after free in XHR.
- CVE-2013-2926: Use after free in editing.
- CVE-2013-2927: Use after free in forms.
* New release 29.0.1547.76.
* New release 30.0.1599.66:
- CVE-2013-2906: Races in Web Audio.
- CVE-2013-2907: Out of bounds read in Window.prototype object.
- CVE-2013-2908: Address bar spoofing related to the “204 No Content”
status code.
- CVE-2013-2909: Use after free in inline-block rendering.
- CVE-2013-2910: Use-after-free in Web Audio.
- CVE-2013-2911: Use-after-free in XSLT.
- CVE-2013-2912: Use-after-free in PPAPI.
- CVE-2013-2913: Use-after-free in XML document parsing.
- CVE-2013-2914: Use after free in the Windows color chooser dialog.
- CVE-2013-2915: Address bar spoofing via a malformed scheme.
- CVE-2013-2916: Address bar spoofing related to the “204 No Content”
status code.
- CVE-2013-2917: Out of bounds read in Web Audio.
- CVE-2013-2918: Use-after-free in DOM.
- CVE-2013-2919: Memory corruption in V8.
- CVE-2013-2920: Out of bounds read in URL parsing.
- CVE-2013-2921: Use-after-free in resource loader.
- CVE-2013-2922: Use-after-free in template element.
- CVE-2013-2923: Various fixes from internal audits, fuzzing and other
initiatives (Chrome 30).
- CVE-2013-2924: Use-after-free in ICU.
* debian/tests/...: Make first real tests using sikuli. Probably quite
fragile on changes to upstream. (LP: #1222895)
* debian/
use their own state instead of checking the parameters of the instance that
started all processes for whether a window has chrome or not. (LP: #1223855)
* Update autopkgtest tests.
* debian/
files.
* debian/rules: Don't build 'reliability_tests' any more. It's deprecated
upstream and we don't use it anyway.
* debian/rules: debian/
configuration changes by stopping our special handling and using the default,
and "you have to change the underscore from the build target into a hyphen".
* debian/rules: Process rpath of files in debian/tmp* BEFORE we copy them out.
(LP: #1226143)
* debian/
(LP: #1226143)
* debian/
caused extensions to fail. (LP: #1232575)
* debian/rules: Use runtime linker for all architectures, not just 64-bit.
Component builds everywhere, now. More than 4GB is too much to expect.
* debian/rules: clean up packaging comparison code.
-- Chad MILLER <email address hidden> Sun, 27 Oct ...