When will syncing be possible again?

Here are the CVE references:

CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team 
(Inferno).
CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0898: Use-after-free in URL handling. Credit to Alexander Potapenko of 
the Chromium development community.
CVE-2013-0897: Off-by-one read in PDF. Credit to Mateusz Jurczyk, with 
contributions by Gynvael Coldwind, both from Google Security Team.
CVE-2013-0896: Memory management issues in plug-in message handling. Credit to 
Google Chrome Security Team (Cris Neckar).
CVE-2013-0895: Incorrect path handling in file copying. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0894: Buffer overflow in vorbis decoding. Credit to Google Chrome 
Security Team (Inferno).
CVE-2013-0893: Race condition in media handling. Credit to Andrew Scherkus of 
the Chromium development community.
CVE-2013-0892: Lower severity issues across the IPC layer. Credit to Google 
Chrome Security Team (Chris Evans).
CVE-2013-0891: Integer overflow in blob handling. Credit to Google Chrome 
Security Team (Jüri Aedla).
CVE-2013-0890: Memory safety issues across the IPC layer. Credit to Google 
Chrome Security Team (Chris Evans).
CVE-2013-0889: Tighten user gesture check for dangerous file downloads.
CVE-2013-0888: Out-of-bounds read in Skia. Credit to Google Chrome Security 
Team (Inferno).
CVE-2013-0887: Developer tools process has too many permissions and places too 
much trust in the connected server.
CVE-2013-0886: Incorrect NaCl signal handling. Credit to Mark Seaborn of the 
Chromium development community.
CVE-2013-0885: Too many API permissions granted to web store.
CVE-2013-0884: Inappropriate load of NaCl. Credit to Google Chrome Security 
Team (Chris Evans).
CVE-2013-0883: Bad read in Skia. Credit to Atte Kettunen of OUSPG.
CVE-2013-0882: Bad memory access with excessive SVG parameters. Credit to 
Renata Hodovan.
CVE-2013-0881: Bad read in Matroska handling. Credit to Atte Kettunen of OUSPG. 
CVE-2013-0880: Use-after-free in database handling. Credit to Chamal de Silva.
CVE-2013-0879: Memory corruption with web audio node. Credit to Atte Kettunen 
of OUSPG.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0879

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0880

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0881

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0882

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0883

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0884

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0885

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0886

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0887

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0888

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0889

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0890

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0891

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0892

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0893

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0894

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0895

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0896

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0897

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0898

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0899

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-0900

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1132568

Title:
  Please update to 25.0.1364.97

Status in “chromium-browser” package in Ubuntu:
  Triaged
Status in “chromium-browser” source package in Lucid:
  Triaged
Status in “chromium-browser” source package in Oneiric:
  Triaged
Status in “chromium-browser” source package in Precise:
  Triaged
Status in “chromium-browser” source package in Quantal:
  Triaged
Status in “chromium-browser” source package in Raring:
  Triaged

Bug description:
  Please update chromium-browser 25.0.1364.97 [1]. v25 fixes several new
  security issues.

  [1]http://googlechromereleases.blogspot.com/2013/02/stable-channel-
  update_21.html

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1132568/+subscriptions

-- 
Mailing list: https://launchpad.net/~desktop-packages
Post to     : desktop-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~desktop-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to