2014-08-23 02:51:03 |
pcworld |
bug |
|
|
added bug |
2014-08-23 02:51:54 |
pcworld |
information type |
Private Security |
Public Security |
|
2014-08-23 02:52:13 |
pcworld |
cve linked |
|
2014-3165 |
|
2014-08-23 02:52:23 |
pcworld |
cve linked |
|
2014-3166 |
|
2014-08-23 02:52:32 |
pcworld |
cve linked |
|
2014-3167 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3168 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3169 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3170 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3171 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3172 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3173 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3174 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3175 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3176 |
|
2014-08-26 14:52:37 |
Florian W. |
cve linked |
|
2014-3177 |
|
2014-08-26 15:12:11 |
Florian W. |
summary |
Security fixes from 36.0.1985.143 |
Security fixes from 36.0.1985.143 and 37.0.2062.94 |
|
2014-08-26 15:12:18 |
Launchpad Janitor |
chromium-browser (Ubuntu): status |
New |
Confirmed |
|
2014-08-26 15:12:51 |
Florian W. |
bug |
|
|
added subscriber Florian W. |
2014-08-27 14:54:12 |
pcworld |
description |
Security fixes from 36.0.1985.143 (some of them were classified as "High" severity by the Chromium development team) should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium.
Information on the new release can be found at: http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html |
Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium.
Note that an exploit was discovered that "can lead to remote code execution outside of the sandbox"
Information on the new releases can be found at:
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html |
|
2014-08-27 14:54:53 |
pcworld |
description |
Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium.
Note that an exploit was discovered that "can lead to remote code execution outside of the sandbox"
Information on the new releases can be found at:
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html |
Security fixes from 37.0.2062.94 and earlier (some of them were classified as "Critical" severity by the Chromium development team, i.e. "can lead to remote code execution outside of the sandbox") should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium.
Information on the new releases can be found at:
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update.html
http://googlechromereleases.blogspot.de/2014/08/stable-channel-update_26.html |
|
2014-09-03 13:06:50 |
Marc Deslauriers |
chromium-browser (Ubuntu): status |
Confirmed |
Fix Released |
|