GLSA 201203-24: Chromium, V8: Multiple vulnerabilities

Title:Chromium, V8: Multiple vulnerabilities
Bugs: #410045


Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code.


Chromium is an open source web browser project. V8 is Google's open source JavaScript engine. SPDY is an experimental networking protocol.

Affected packages

Package Vulnerable Unaffected Architecture(s)
www-client/chromium < 18.0.1025.142 >= 18.0.1025.142 All supported architectures
dev-lang/v8 < >= All supported architectures


Multiple vulnerabilities have been discovered in Chromium and V8. Please review the CVE identifiers and release notes referenced below for details.


A context-dependent attacker could entice a user to open a specially crafted web site or JavaScript program using Chromium or V8, possibly resulting in the execution of arbitrary code with the privileges of the process, or a Denial of Service condition.

The attacker could also entice a user to open a specially crafted web site using Chromium, possibly resulting in cross-site scripting (XSS), or an unspecified SPDY certificate checking error.


There is no known workaround at this time.


All Chromium users should upgrade to the latest version:

      # emerge --sync
      # emerge --ask --oneshot --verbose

All V8 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-lang/v8-"



This GLSA and any updates to it are available for viewing at the Gentoo Security Website:


Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to or alternatively, you may file a bug at


Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!