When will syncing be possible again? Here are the CVE references:
CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team (Inferno). CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of the Chromium development community. CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with contributions by Gynvael Coldwind, both from Google Security Team. CVE-2013-0896: Memory management issues in plug-in message handling. Credit to Google Chrome Security Team (Cris Neckar). CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome Security Team (Inferno). CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of the Chromium development community. CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome Security Team (Jüri Aedla). CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0889: Tighten user gesture check for dangerous file downloads. CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security Team (Inferno). CVE-2013-0887: Developer tools process has too many permissions and places too much trust in the connected server. CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the Chromium development community. CVE-2013-0885: Too many API permissions granted to web store. CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security Team (Chris Evans). CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG. CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to Renata Hodovan. CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva. CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen of OUSPG. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0879 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0880 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0881 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0882 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0883 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0884 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0885 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0886 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0887 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0888 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0889 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0890 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0891 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0892 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0893 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0894 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0895 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0896 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0897 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0898 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0899 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2013-0900 -- You received this bug notification because you are a member of Desktop Packages, which is subscribed to chromium-browser in Ubuntu. https://bugs.launchpad.net/bugs/1132568 Title: Please update to 25.0.1364.97 Status in “chromium-browser” package in Ubuntu: Triaged Status in “chromium-browser” source package in Lucid: Triaged Status in “chromium-browser” source package in Oneiric: Triaged Status in “chromium-browser” source package in Precise: Triaged Status in “chromium-browser” source package in Quantal: Triaged Status in “chromium-browser” source package in Raring: Triaged Bug description: Please update chromium-browser 25.0.1364.97 [1]. v25 fixes several new security issues. [1]http://googlechromereleases.blogspot.com/2013/02/stable-channel- update_21.html To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions -- Mailing list: https://launchpad.net/~desktop-packages Post to : desktop-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~desktop-packages More help : https://help.launchpad.net/ListHelp