Release notes in URL.
Please stabilize for amd64 and x86.
Sorry, target is: =www-client/chromium-18.0.1025.168 The release notes do not mention V8, so no security bump there.
amd64 stable
CVE-2012-1521 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1521): Use-after-free vulnerability in the XML parser in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors. CVE-2011-3081 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3081): Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3078. CVE-2011-3080 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3080): Race condition in the Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 allows attackers to bypass intended sandbox restrictions via unspecified vectors. CVE-2011-3079 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3079): The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168 does not properly validate messages, which has unspecified impact and attack vectors. CVE-2011-3078 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3078): Use-after-free vulnerability in Google Chrome before 18.0.1025.168 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the floating of elements, a different vulnerability than CVE-2011-3081.
x86 stable. Pawel, go ahead with the advisory.
Removed Windows-specific vulnerabilities that do not affect Gentoo.
(In reply to comment #5) > Pawel, go ahead with the advisory. GLSA draft ready, please review.
This issue was resolved and addressed in GLSA 201205-01 at http://security.gentoo.org/glsa/glsa-201205-01.xml by GLSA coordinator Tim Sammut (underling).