From ${URL} : The stable channel has been updated to 50.0.2661.102 for Windows, Mac, and Linux. Security Fixes and Rewards Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. This update includes 5 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information. [$8000][605766] High CVE-2016-1667: Same origin bypass in DOM. Credit to Mariusz Mlynski. [$7500][605910] High CVE-2016-1668: Same origin bypass in Blink V8 bindings. Credit to Mariusz Mlynski. [$3000][606115] High CVE-2016-1669: Buffer overflow in V8. Credit to Choongwoo Han. [$1337][578882] Medium CVE-2016-1670: Race condition in loader. Credit to anonymous. [$500][586657] Medium CVE-2016-1671: Directory traversal using the file scheme on Android. Credit to Jann Horn. @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
I added the ebuild, please stabilize it.
stabilization and cleanup done
Arches and Maintainer(s), Thank you for your work. Added to an existing GLSA Request.
This issue was resolved and addressed in GLSA 201605-02 at https://security.gentoo.org/glsa/201605-02 by GLSA coordinator Yury German (BlueKnight).