chromium-browser, oxide-qt
2018-01-15 14:51
CVE-2017-5066 chromium-browser
2017-11-13 20:36
2017-11-06 22:07
2017-11-01 14:03
2017-10-30 16:24
2017-10-23 14:23
2017-07-20 21:32
2017-06-15 17:13
2017-05-10 23:51
2017-04-26 19:04


Insufficient consistency checks in signature handling in the networking stack in Google Chrome prior to 58.0.3029.81 for Mac, Windows, and Linux, and 58.0.3029.83 for Android, allowed a remote attacker to incorrectly accept a badly formed X.509 certificate via a crafted HTML page.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
artful chromium-browser 58.0.3029.81-0ubuntu2.1350
devel chromium-browser 58.0.3029.81-0ubuntu2.1350
trusty chromium-browser 58.0.3029.81-0ubuntu0.14.04.1172
oxide-qt None
upstream chromium-browser 58.0.3029.81
xenial chromium-browser 58.0.3029.81-0ubuntu0.16.04.1277
yakkety chromium-browser 58.0.3029.81-0ubuntu0.16.10.1345
zesty chromium-browser 58.0.3029.81-0ubuntu2.17.04.1350


Release Package Reason
precise chromium-browser ignored
oxide-qt DNE
precise/esm chromium-browser DNE
oxide-qt DNE
vivid/ubuntu-core chromium-browser DNE
oxide-qt DNE
vivid/stable-phone-overlay chromium-browser DNE
oxide-qt ignored
yakkety oxide-qt ignored
zesty oxide-qt ignored
devel oxide-qt DNE

Needs Triage

Release Package Reason
upstream oxide-qt needs-triage
xenial oxide-qt needs-triage
artful oxide-qt needs-triage