Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 716612 (CVE-2020-6423, CVE-2020-6430, CVE-2020-6431, CVE-2020-6432, CVE-2020-6433, CVE-2020-6434, CVE-2020-6435, CVE-2020-6436, CVE-2020-6437, CVE-2020-6438, CVE-2020-6439, CVE-2020-6440, CVE-2020-6441, CVE-2020-6442, CVE-2020-6443, CVE-2020-6444, CVE-2020-6445, CVE-2020-6446, CVE-2020-6447, CVE-2020-6448, CVE-2020-6454, CVE-2020-6455, CVE-2020-6456) - <www-client/{chromium,google-chrome}-81.0.4044.92: Multiple vulnerabilities (CVE-2020-{6423,6430,6431,6432,6433,6434,6435,6436,6437,6438,6439,6440})
Summary: <www-client/{chromium,google-chrome}-81.0.4044.92: Multiple vulnerabilities (...
Status: RESOLVED FIXED
Alias: CVE-2020-6423, CVE-2020-6430, CVE-2020-6431, CVE-2020-6432, CVE-2020-6433, CVE-2020-6434, CVE-2020-6435, CVE-2020-6436, CVE-2020-6437, CVE-2020-6438, CVE-2020-6439, CVE-2020-6440, CVE-2020-6441, CVE-2020-6442, CVE-2020-6443, CVE-2020-6444, CVE-2020-6445, CVE-2020-6446, CVE-2020-6447, CVE-2020-6448, CVE-2020-6454, CVE-2020-6455, CVE-2020-6456
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal major (vote)
Assignee: Gentoo Security
URL: https://chromereleases.googleblog.com...
Whiteboard: A2 [glsa+ cve]
Keywords: PullRequest
Depends on:
Blocks:
 
Reported: 2020-04-07 20:01 UTC by Stephan Hartmann
Modified: 2020-04-10 22:03 UTC (History)
1 user (show)

See Also:
Package list:
www-client/chromium-81.0.4044.92
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stephan Hartmann gentoo-dev 2020-04-07 20:01:43 UTC
See ${URL}

{chromium,google-chrome}-81.0.4044.92 is already in the tree. Only want to add a patch to chromium to fix building with gcc-10.

Reproducible: Always
Comment 1 Sam James archtester gentoo-dev Security 2020-04-08 04:19:36 UTC
@maintainer(s), please advise if ready for stabilisation, or call yourself.
Comment 2 Agostino Sarubbo gentoo-dev 2020-04-09 12:25:41 UTC
amd64 stable.

Maintainer(s), please cleanup.
Security, please add it to the existing request, or file a new one.
Comment 3 NATTkA bot gentoo-dev 2020-04-09 12:28:32 UTC
Resetting sanity check; keywords are not fully specified and arches are not CC-ed.
Comment 4 Larry the Git Cow gentoo-dev 2020-04-09 17:20:16 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4da704c93b1a3b46a159986d86084b857e5e36ba

commit 4da704c93b1a3b46a159986d86084b857e5e36ba
Author:     Stephan Hartmann <stha09@googlemail.com>
AuthorDate: 2020-04-09 13:30:25 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2020-04-09 17:20:08 +0000

    www-client/chromium: security cleanup
    
    Bug: https://bugs.gentoo.org/716612
    Package-Manager: Portage-2.3.89, Repoman-2.3.20
    Signed-off-by: Stephan Hartmann <stha09@googlemail.com>
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>
    Closes: https://github.com/gentoo/gentoo/pull/15274

 www-client/chromium/Manifest                       |   2 -
 www-client/chromium/chromium-80.0.3987.162.ebuild  | 747 ---------------------
 www-client/chromium/chromium-80.0.3987.163.ebuild  | 747 ---------------------
 .../chromium/files/chromium-77-system-icu.patch    |  20 -
 .../chromium/files/chromium-80-gcc-abstract.patch  |  41 --
 .../files/chromium-80-gcc-incomplete-type.patch    | 229 -------
 .../files/chromium-80-gcc-permissive.patch         |  33 -
 .../chromium/files/chromium-80-include.patch       |  33 -
 .../files/chromium-80-unbundle-libxml.patch        | 101 ---
 .../chromium/files/chromium-compiler-r10.patch     | 185 -----
 .../chromium/files/chromium-unbundle-zlib-r1.patch |  13 -
 11 files changed, 2151 deletions(-)
Comment 5 Sam James archtester gentoo-dev Security 2020-04-09 17:22:41 UTC
Tree clean, thanks!
Comment 6 Thomas Deutschmann gentoo-dev Security 2020-04-10 21:56:11 UTC
New GLSA request filed.
Comment 7 GLSAMaker/CVETool Bot gentoo-dev 2020-04-10 22:03:31 UTC
This issue was resolved and addressed in
 GLSA 202004-09 at https://security.gentoo.org/glsa/202004-09
by GLSA coordinator Thomas Deutschmann (whissi).