Multiple vulnerabilities have been reported in Chromium and V8,
some of which may allow execution of arbitrary code and local root
privilege escalation.
Background
Chromium is an open-source web browser project. V8 is Google's open
source JavaScript engine.
Multiple vulnerabilities have been discovered in Chromium and V8. Please
review the CVE identifiers and release notes referenced below for
details.
Impact
A local attacker could gain root privileges (CVE-2011-1444, fixed in
chromium-11.0.696.57).
A context-dependent attacker could entice a user to open a specially
crafted web site or JavaScript program using Chromium or V8, possibly
resulting in the execution of arbitrary code with the privileges of the
process, or a Denial of Service condition. The attacker also could obtain
cookies and other sensitive information, conduct man-in-the-middle
attacks, perform address bar spoofing, bypass the same origin policy,
perform Cross-Site Scripting attacks, or bypass pop-up blocks.
Workaround
There is no known workaround at this time.
Resolution
All Chromium users should upgrade to the latest version:
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.