Release notes: http://googlechromereleases.blogspot.com/2011/05/stable-channel-update.html
Multiple vulnerabilities have been reported in Chromium, that may
allow user-assisted execution of arbitrary code within confines of the sandbox.
A remote attacker could entice a user to visit a specially-crafted web page
that would trigger one of the vulnerabilities, leading to execution of
arbitrary code within confines of the sandbox, or a Denial of Service.
Arches, please stabilize =www-client/chromium-11.0.696.68
works as usual.
x86 stable. Thanks
amd64 done. Thanks Agostino
Thanks, everyone. Added to existing GLSA request.
This issue was resolved and addressed in
GLSA 201111-01 at http://security.gentoo.org/glsa/glsa-201111-01.xml
by GLSA coordinator Alex Legler (a3li).
Multiple integer overflows in the SVG Filters implementation in WebCore in
WebKit in Google Chrome before 11.0.696.68 allow remote attackers to cause a
denial of service or possibly have unspecified other impact via unknown
Google Chrome before 11.0.696.68 does not properly perform casts of
variables during interaction with the WebKit engine, which allows remote
attackers to cause a denial of service or possibly have unspecified other
impact via unknown vectors.