Activity log for bug #1360505

Date Who What changed Old value New value Message
2014-08-23 02:51:03 pcworld bug added bug
2014-08-23 02:51:54 pcworld information type Private Security Public Security
2014-08-23 02:52:13 pcworld cve linked 2014-3165
2014-08-23 02:52:23 pcworld cve linked 2014-3166
2014-08-23 02:52:32 pcworld cve linked 2014-3167
2014-08-26 14:52:37 Florian W. cve linked 2014-3168
2014-08-26 14:52:37 Florian W. cve linked 2014-3169
2014-08-26 14:52:37 Florian W. cve linked 2014-3170
2014-08-26 14:52:37 Florian W. cve linked 2014-3171
2014-08-26 14:52:37 Florian W. cve linked 2014-3172
2014-08-26 14:52:37 Florian W. cve linked 2014-3173
2014-08-26 14:52:37 Florian W. cve linked 2014-3174
2014-08-26 14:52:37 Florian W. cve linked 2014-3175
2014-08-26 14:52:37 Florian W. cve linked 2014-3176
2014-08-26 14:52:37 Florian W. cve linked 2014-3177
2014-08-26 15:12:11 Florian W. summary Security fixes from 36.0.1985.143 Security fixes from 36.0.1985.143 and 37.0.2062.94
2014-08-26 15:12:18 Launchpad Janitor chromium-browser (Ubuntu): status New Confirmed
2014-08-26 15:12:51 Florian W. bug added subscriber Florian W.
2014-08-27 14:54:12 pcworld description Security fixes from 36.0.1985.143 (some of them were classified as "High" severity by the Chromium development team) should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium. Information on the new release can be found at: http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium. Note that an exploit was discovered that "can lead to remote code execution outside of the sandbox" Information on the new releases can be found at: http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html
2014-08-27 14:54:53 pcworld description Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium. Note that an exploit was discovered that "can lead to remote code execution outside of the sandbox" Information on the new releases can be found at: http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium. Information on the new releases can be found at: http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html
2014-09-03 13:06:50 Marc Deslauriers chromium-browser (Ubuntu): status Confirmed Fix Released