CVE-2014-3166
Published: 13 August 2014
The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names.
Priority
Status
Package | Release | Status |
---|---|---|
chromium-browser Launchpad, Ubuntu, Debian |
lucid |
Ignored
(end of life)
|
precise |
Released
(37.0.2062.94-0ubuntu0.12.04.1~pkg909)
|
|
trusty |
Released
(37.0.2062.94-0ubuntu0.14.04.1~pkg1042)
|
|
upstream |
Released
(36.0.1985.143)
|
|
oxide-qt Launchpad, Ubuntu, Debian |
lucid |
Does not exist
|
precise |
Does not exist
|
|
trusty |
Released
(1.0.5-0ubuntu0.14.04.1)
|
|
upstream |
Released
(1.0.5)
|
References
- https://src.chromium.org/viewvc/chrome?revision=288435&view=revision
- https://code.google.com/p/chromium/issues/detail?id=398925
- http://www.ietf.org/mail-archive/web/tls/current/msg13345.html
- http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2014/08/chrome-for-android-update.html
- https://ubuntu.com/security/notices/USN-2320-1
- https://www.cve.org/CVERecord?id=CVE-2014-3166
- NVD
- Launchpad
- Debian