Release notes: http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html
Please stabilize =www-client/chromium-16.0.912.77
Pawel: as per our previous agreement (via mail) about stabilization, please don't CC amd64. CC me and Richard (rich0). Thanks :)
amd64 stable
x86 stable GLSA draft is ready, security please review
This issue was resolved and addressed in GLSA 201201-17 at http://security.gentoo.org/glsa/glsa-201201-17.xml by GLSA coordinator Tim Sammut (underling).
CVE-2011-3928 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3928): Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM handling. CVE-2011-3927 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3927): Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of values, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. CVE-2011-3926 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3926): Heap-based buffer overflow in the tree builder in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. CVE-2011-3924 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3924): Use-after-free vulnerability in Google Chrome before 16.0.912.77 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOM selections.