Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 545300 (CVE-2015-1233) - <www-client/chromium-41.0.2272.118: multiple vulnerabilities (CVE-2015-{1233,1234})
Summary: <www-client/chromium-41.0.2272.118: multiple vulnerabilities (CVE-2015-{1233,...
Alias: CVE-2015-1233
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: http://googlechromereleases.blogspot....
Whiteboard: A2 [glsa]
Depends on:
Reported: 2015-04-02 09:26 UTC by Agostino Sarubbo
Modified: 2015-06-23 04:01 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2015-04-02 09:26:01 UTC
From ${URL} :

The stable channel has been updated to 41.0.2272.118 for Windows, Mac and Linux. A partial list of changes is available in the log.

 Security Fixes and Rewards

 Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 4 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

[$29633.7][469058] Critical CVE-2015-1233: A special thanks to Anonymous for a combination of V8, Gamepad and IPC bugs that can lead to remote code execution outside of the sandbox. 
[468936] High CVE-2015-1234: Buffer overflow via race condition in GPU. Credit to lokihardt working with Pwn2Own and HP’s Zero Day Initiative.

@maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
Comment 1 GLSAMaker/CVETool Bot gentoo-dev 2015-04-05 05:12:58 UTC
CVE-2015-1234 (
  Race condition in gpu/command_buffer/service/ in Google
  Chrome before 41.0.2272.118 allows remote attackers to cause a denial of
  service (buffer overflow) or possibly have unspecified other impact by
  manipulating OpenGL ES commands.

CVE-2015-1233 (
  Google Chrome before 41.0.2272.118 does not properly handle the interaction
  of IPC, the Gamepad API, and Google V8, which allows remote attackers to
  execute arbitrary code via unspecified vectors.
Comment 2 Mike Gilbert gentoo-dev 2015-04-06 20:17:15 UTC
chromium-41.0.2272.118 is in the tree. Please stabilize on amd64 and x86.
Comment 3 Richard Freeman gentoo-dev 2015-04-06 23:14:47 UTC
amd64 stable
Comment 4 Agostino Sarubbo gentoo-dev 2015-04-07 07:11:47 UTC
x86 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 5 Agostino Sarubbo gentoo-dev 2015-04-07 16:11:34 UTC
old removed.
Comment 6 Yury German Gentoo Infrastructure gentoo-dev 2015-04-10 23:21:17 UTC
Arches and Maintainer(s), Thank you for your work.

New GLSA Request filed.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2015-06-23 04:01:52 UTC
This issue was resolved and addressed in
 GLSA 201506-04 at
by GLSA coordinator Yury German (BlueKnight).