And again a new stable release: 24.0.1312.52.
As always, it comes with *lots* of security fixes
(http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html),
including a Flash update
(http://helpx.adobe.com/en/flash-player/release-note/fp_115_air_35_release_notes.html)
Please up
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release: 24.0.1312.52.
As always, it comes with *lots* of security fixes
(http://googlechromereleases.blogspot.de/2013/01/stable-channel-update.html),
including a Flash update
(http://helpx.adobe.
Ok, here's the new one: #1099075
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1086613
Title:
Please update to 23.0.1271.97
Status in “chromium-browser” package in Ubuntu:
Public bug reported:
Changelog: https://www.mozilla.org/en-
US/firefox/18.0.1/releasenotes/buglist.html
** Affects: firefox (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox
Care to explain the relevance of a weekday for software upgrades?
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1101843
Title:
new upstream release: 18.0.1
Status in “firefox” packa
And again: 24.0.1312.56
Security fixes:
* [$1000] [151008] High CVE-2013-0839: Use-after-free in canvas font handling.
Credit to Atte Kettunen of OUSPG.
* [170532] Medium CVE-2013-0840: Missing URL validation when opening new
windows.
* [169770] High CVE-2013-0841: Unchecked array index in cont
When will syncing be possible again?
Here are the CVE references:
CVE-2013-0900: Race condition in ICU. Credit to Google Chrome Security Team
(Inferno).
CVE-2013-0899: Integer overflow in Opus handling. Credit to Google Chrome
Security Team (Jüri Aedla).
CVE-2013-0898: Use-after-free in URL han
And another release: http://googlechromereleases.blogspot.de/2013/03
/stable-channel-update_4.html
The new CVEs:
[$1000] [176882] High CVE-2013-0902: Use-after-free in frame loader. Credit
to Chamal de Silva.
[$1000] [176252] High CVE-2013-0903: Use-after-free in browser navigation
hand
Now it's 26.0.1410.63: http://googlechromereleases.blogspot.de/2013/04
/stable-channel-update.html
This release contains stability improvements, and a new version of Adobe
Flash: http://helpx.adobe.com/en/flash-player/release-
note/fp_117_air_37_release_notes.html
** Summary changed:
- Please up
And 27.0.1453.110: http://googlechromereleases.blogspot.com/2013/06
/stable-channel-update.html
CVE-2013-2854: Bad handle passed to renderer.
CVE-2013-2855: Memory corruption in dev tools API.
CVE-2013-2856: Use-after-free in input handling.
CVE-2013-2857: Use-after-free in image handling.
CVE
lol, even Debian Stable managed to do this: http://lists.debian.org
/debian-security-announce/2013/msg00114.html
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1183086
Title:
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/08/stable-channel-
update.html
Here are the CVEs:
CVE-2013-2887: Various fixes from internal audits, fuzzing and o
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release:
http://googlechromereleases.blogspot.de/2013/03/stable-channel-update_12.html
Comes with a new Flash:
https://www.adobe.com/support/security/bulletins/apsb13-09.html
Here are the CVEs:
-
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.de/2013/05/stable-channel-
release.html
Here are the CVEs:
CVE-2013-2837: Use-after-free in SVG.
CVE-2013-2838: Out-of-boun
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/07/stable-channel-
update_30.html
Here are some CVEs:
CVE-2013-2881: Origin bypass in frame handling.
CVE-2013-28
And Debians package: http://packages.qa.debian.org/c/chromium-
browser/news/20130731T071212Z.html
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1207019
Title:
Please update
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.com/2013/07/stable-channel-
update.html
Here are the CVEs:
CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL.
CVE
*** This bug is a security vulnerability ***
Public security bug reported:
And again a new stable release with lots of security fixes:
http://googlechromereleases.blogspot.de/2013/03/stable-channel-
update_26.html
Here are the CVEs:
[$1000] [172342] High CVE-2013-0916: Use-after-free in Web Aud
18 matches
Mail list logo