Release notes: http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html Synopsis: Multiple vulnerabilities have been reported in Chromium, that may allow user-assisted execution of arbitrary code within confines of the sandbox. Impact: A remote attacker could entice a user to visit a specially-crafted web page that would trigger one of the vulnerabilities, leading to execution of arbitrary code within confines of the sandbox, or a Denial of Service. Arches, please stabilize =www-client/chromium-11.0.696.68
works as usual.
x86 stable. Thanks
amd64 done. Thanks Agostino
Thanks, everyone. Added to existing GLSA request.
This issue was resolved and addressed in GLSA 201111-01 at http://security.gentoo.org/glsa/glsa-201111-01.xml by GLSA coordinator Alex Legler (a3li).
CVE-2011-1800 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1800): Multiple integer overflows in the SVG Filters implementation in WebCore in WebKit in Google Chrome before 11.0.696.68 allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. CVE-2011-1799 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1799): Google Chrome before 11.0.696.68 does not properly perform casts of variables during interaction with the WebKit engine, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.