From ${URL} : Description Multiple vulnerabilities have been reported in Google Chrome, where multiple have an unknown impact and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system. 1) The application bundles a vulnerable version of Adobe Flash Player. For more information: SA58593 2) A use-after-free error exists within web sockets. No further information is currently available. Successful exploitation of this vulnerability may allow execution of arbitrary code. 3) An error within SPDY can be exploited by disclose certain information. No further information is currently available. 4) Multiple unspecified errors exist. No further information is currently available. The vulnerabilities are reported in versions prior to 36.0.1985.143. Solution: Update to version 36.0.1985.143. Provided and/or discovered by: 4) Reported by the vendor The vendor credits: 2) Collin Payne 3) Antoine Delignat-Lavaud Original Advisory: http://googlechromereleases.blogspot.com/2014/08/stable-channel-update.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Please stabilize on amd64 and x86. =www-client/chromium-36.0.1985.143
amd64 stable
CVE-2014-3167 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3167): Multiple unspecified vulnerabilities in Google Chrome before 36.0.1985.143 allow attackers to cause a denial of service or possibly have other impact via unknown vectors. CVE-2014-3166 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3166): The Public Key Pinning (PKP) implementation in Google Chrome before 36.0.1985.143 on Windows, OS X, and Linux, and before 36.0.1985.135 on Android, does not correctly consider the properties of SPDY connections, which allows remote attackers to obtain sensitive information by leveraging the use of multiple domain names. CVE-2014-3165 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3165): Use-after-free vulnerability in modules/websockets/WorkerThreadableWebSocketChannel.cpp in the Web Sockets implementation in Blink, as used in Google Chrome before 36.0.1985.143, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an unexpectedly long lifetime of a temporary object during method completion. CVE-2014-0538 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0538): Use-after-free vulnerability in Adobe Flash Player before 13.0.0.241 and 14.x before 14.0.0.176 on Windows and OS X and before 11.2.202.400 on Linux, Adobe AIR before 14.0.0.178 on Windows and OS X and before 14.0.0.179 on Android, Adobe AIR SDK before 14.0.0.178, and Adobe AIR SDK & Compiler before 14.0.0.178 allows attackers to execute arbitrary code via unspecified vectors.
x86 stable. Maintainer(s), please cleanup. Security, please add it to the existing request, or file a new one.
Added to existing GLSA draft
This issue was resolved and addressed in GLSA 201408-16 at http://security.gentoo.org/glsa/glsa-201408-16.xml by GLSA coordinator Kristian Fiskerstrand (K_F).