Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 737942 (CVE-2020-6556) - <www-client/{chromium,google-chrome}-84.0.4147.135: Heap buffer overflow in SwiftShader (CVE-2020-6556)
Summary: <www-client/{chromium,google-chrome}-84.0.4147.135: Heap buffer overflow in S...
Status: RESOLVED FIXED
Alias: CVE-2020-6556
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://chromereleases.googleblog.com...
Whiteboard: A2 [glsa+ cve]
Keywords: PullRequest
Depends on:
Blocks:
 
Reported: 2020-08-18 18:50 UTC by Stephan Hartmann (RETIRED)
Modified: 2020-08-25 12:54 UTC (History)
1 user (show)

See Also:
Package list:
www-client/chromium-84.0.4147.135
Runtime testing required: ---
nattka: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stephan Hartmann (RETIRED) gentoo-dev 2020-08-18 18:50:05 UTC
See ${URL}.

Chromium tarball is not available yet.
Comment 1 Larry the Git Cow gentoo-dev 2020-08-19 16:19:36 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=13d78c91d96e30626063dbb3039a0e544db298eb

commit 13d78c91d96e30626063dbb3039a0e544db298eb
Author:     Stephan Hartmann <stha09@googlemail.com>
AuthorDate: 2020-08-19 08:16:10 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2020-08-19 16:19:19 +0000

    www-client/chromium: stable channel bump to 84.0.4147.135
    
    Bug: https://bugs.gentoo.org/737942
    Package-Manager: Portage-2.3.103, Repoman-2.3.23
    Signed-off-by: Stephan Hartmann <stha09@googlemail.com>
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>
    Closes: https://github.com/gentoo/gentoo/pull/17169

 www-client/chromium/Manifest                      |   1 +
 www-client/chromium/chromium-84.0.4147.135.ebuild | 866 ++++++++++++++++++++++
 2 files changed, 867 insertions(+)
Comment 2 Agostino Sarubbo gentoo-dev 2020-08-21 15:26:06 UTC
amd64 stable
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-22 20:14:01 UTC
arm64 done

all arches done
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-08-22 20:14:43 UTC
Needs cleanup, which I can do later.
Comment 5 Larry the Git Cow gentoo-dev 2020-08-24 00:45:02 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=643e642014d2a7a97306f4284abf9eaa143cfc7c

commit 643e642014d2a7a97306f4284abf9eaa143cfc7c
Author:     Stephan Hartmann <stha09@googlemail.com>
AuthorDate: 2020-08-24 00:44:57 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2020-08-24 00:44:57 +0000

    www-client/chromium: security cleanup
    
    Bug: https://bugs.gentoo.org/737942
    Package-Manager: Portage-2.3.103, Repoman-2.3.23
    Signed-off-by: Stephan Hartmann <stha09@googlemail.com>
    Closes: https://github.com/gentoo/gentoo/pull/17230
    Signed-off-by: Sam James <sam@gentoo.org>

 www-client/chromium/Manifest                      |   1 -
 www-client/chromium/chromium-84.0.4147.125.ebuild | 864 ----------------------
 2 files changed, 865 deletions(-)
Comment 6 GLSAMaker/CVETool Bot gentoo-dev 2020-08-25 12:54:26 UTC
This issue was resolved and addressed in
 GLSA 202008-10 at https://security.gentoo.org/glsa/202008-10
by GLSA coordinator Sam James (sam_c).