Security fixes from 32.0.1700.77
Bug #1269387 reported by
pcworld
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
chromium-browser (Ubuntu) |
Fix Released
|
Undecided
|
Chad Miller |
Bug Description
Security fixes from 32.0.1700.77 (some of them were classified as "High" severity by the Chromium development team) should be either backported to the respective Chromium versions in all current desktop-supported releases of Ubuntu, or the repositories should be updated to include the new version of Chromium.
Information on the new release can be found at: http://
information type: | Private Security → Public Security |
Changed in chromium-browser (Ubuntu): | |
status: | New → In Progress |
assignee: | nobody → Chad Miller (cmiller) |
To post a comment you must log in.
This bug was fixed in the package chromium-browser - 32.0.1700. 102-0ubuntu0. 13.10.1~ 20140128. 970.1
--------------- 102-0ubuntu0. 13.10.1~ 20140128. 970.1) saucy-security; urgency=low
chromium-browser (32.0.1700.
* Release to stage at ppa:canonical- chromium- builds/ stage
chromium-browser (32.0.1700. 102-0ubuntu0. 13.10.1) UNRELEASED; urgency=low
* Upstream release 32.0.1700.102:
- CVE-2013-6649: Use-after-free in SVG images.
- CVE-2013-6650: Memory corruption in V8. This issue was fixed in v8
version 3.22.24.16.
-- Chad MILLER <email address hidden> Tue, 28 Jan 2014 17:29:30 -0500