Summary: | <=www-client/chromium-bin-? buffer overflow (CVE-2009-2121) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Stefan Behte (RETIRED) <craig> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | voyageur |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://googlechromereleases.blogspot.com/2009/06/stable-beta-update-security-fix.html | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Stefan Behte (RETIRED)
2009-06-28 20:59:50 UTC
This is hardmasked, so we do not have to hurry. chromium-bin-9999 is hardmasked, but -0_p* are not (just ~x86 keyworded), so let's fix that one ;) From http://code.google.com/p/chromium/issues/detail?id=14508, chromium trunk was fixed in revision 18687, so for us it's <=www-client/chromium-bin-0_p18366 vulnerable. I've just removed this version from portage I've tested the "listener of death" from the bugreport with 0_p19106 (current ebuild in portage), and it did not crash Thanks! Closing noglsa. |