|Summary:||<www-client/chromium-17.0.963.78: multiple vulnerabilities (CVE-2011-3046)|
|Product:||Gentoo Security||Reporter:||Paweł Hajdan, Jr. (RETIRED) <phajdan.jr>|
|Component:||Vulnerabilities||Assignee:||Gentoo Security <security>|
|Package list:||Runtime testing required:||---|
Description Paweł Hajdan, Jr. (RETIRED) 2012-03-08 20:35:17 UTC
Comment 1 Paweł Hajdan, Jr. (RETIRED) 2012-03-08 20:38:01 UTC
Please test and mark stable =www-client/chromium-17.0.963.78 Sorry for two stabilizations in short time frame. Blame Pwn2Own etc.
Comment 2 Mike Gilbert 2012-03-08 20:45:38 UTC
I also bumped v8. To the best of my knowledge this was not a security fix, so stabilization of dev-lang/v8-184.108.40.206 is OPTIONAL.
Comment 3 GLSAMaker/CVETool Bot 2012-03-09 12:40:44 UTC
CVE-2011-3046 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3046): The extension subsystem in Google Chrome before 17.0.963.78 does not properly handle history navigation, which allows remote attackers to execute arbitrary code by leveraging a "Universal XSS (UXSS)" issue.
Comment 4 Agostino Sarubbo 2012-03-09 13:27:37 UTC
(In reply to comment #1) > Please test and mark stable =www-client/chromium-17.0.963.78 > > Sorry for two stabilizations in short time frame. Blame Pwn2Own etc. no problem, is not your fault. Please keyword both for amd64, I have not cvs access atm.
Comment 5 Mike Gilbert 2012-03-09 15:25:25 UTC
(In reply to comment #4) > Please keyword both for amd64, I have not cvs access atm. Done.
Comment 6 Dan Dexter 2012-03-10 21:11:02 UTC
Archtested on x86: Everything OK. - Compiled www-client/chromium-17.0.963.78 with various use flags successfully. - Package test phase passed. - Ran several additional frontend and backend test cases from: http://www.chromium.org/for-testers - Used www-client/chromium-17.0.963.78 for everyday browsing (and writing this comment). Note: This was with the current stable v8 (dev-lang/v8-220.127.116.11), not with the version mentioned in comment #2.
Comment 7 Mike Gilbert 2012-03-11 03:52:25 UTC
Thanks for testing, Dan. A new vulnerability has since been discovered. See bug 407755.
Comment 8 Paweł Hajdan, Jr. (RETIRED) 2012-03-11 12:01:53 UTC
Stabilization is now handled in bug #407755 . GLSA draft updated.
Comment 9 GLSAMaker/CVETool Bot 2012-03-25 16:07:56 UTC
This issue was resolved and addressed in GLSA 201203-19 at http://security.gentoo.org/glsa/glsa-201203-19.xml by GLSA coordinator Tim Sammut (underling).