Issue metadata
Sign in to add a comment
|
|
||||||||||||||||||||
Issue descriptionexploit #1 from pwn2own 2015 Mar 19 2015,
Mar 19 2015,
Mar 19 2015,Uploading a usable file format. Mar 19 2015,PDF attached. Mar 19 2015,
this exploit gives execution within the GPU process but a sandbox escape is required to get full access, so it's only severity High Mar 19 2015,
Mar 19 2015, Project Member
Mar 20 2015,
Mar 21 2015, Project Member
Adding Merge-Triage label for tracking purposes. Once your fix had sufficient bake time (on canary, dev as appropriate), please nominate your fix for merge by adding the Merge-Requested label. When your merge is approved by the release manager, please start merging with higher milestone label first. Make sure to re-request merge for every milestone in the label list. You can get branch information on omahaproxy.appspot.com. - Your friendly ClusterFuzz Apr 8 2015,
Tracking bug - no merge required. Apr 9 2015,
Jun 26 2015, Project Member
Bulk update: removing view restriction from closed bugs. Oct 1 2016, Project MemberThis bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot Oct 2 2016, Project MemberThis bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot Oct 2 2016,
|
|||||||||||||||||||||
►
Sign in to add a comment |
Comment 1 by timwillis@google.com, Mar 19 2015