
====================================================================

                              CERT-Renater

                 Note d'Information No. 2017/VULN245
_____________________________________________________________________

DATE                : 07/09/2017

HARDWARE PLATFORM(S):  /

OPERATING SYSTEM(S): Systems running Google Chrome versions prior to
                                61.0.3163.79.

=====================================================================
https://chromereleases.googleblog.com/2017/09/stable-channel-update-for-desktop.html
____________________________________________________________________

Stable Channel Update for Desktop


Tuesday, September 5, 2017

The Chrome team is delighted to announce the promotion of Chrome 61 to
the stable channel for Windows, Mac and Linux. This will roll out over
the coming days/weeks.

 Chrome 61.0.3163.79 contains a number of fixes and improvements -- a
list of changes is available in the log. Watch out for upcoming Chrome
and Chromium blog posts about new features and big efforts delivered in
61.


Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a
majority of users are updated with a fix. We will also retain
restrictions if the bug exists in a third party library that other
projects similarly depend on, but haven’t yet fixed.

 This update includes 22 security fixes. Below, we highlight fixes that
were contributed by external researchers. Please see the Chrome
Security Page for more information.

[$5000][737023] High CVE-2017-5111: Use after free in PDFium. Reported
                 by Luật Nguyễn (@l4wio) of KeenLab, Tencent on
                 2017-06-27
[$5000][740603] High CVE-2017-5112: Heap buffer overflow in WebGL.
                 Reported by Tobias Klein (www.trapkit.de) on 2017-07-10
[$5000][747043] High CVE-2017-5113: Heap buffer overflow in Skia.
                 Reported by Anonymous on 2017-07-20
[$3500][752829] High CVE-2017-5114: Memory lifecycle issue in PDFium.
                 Reported by Ke Liu of Tencent's Xuanwu LAB on
                 2017-08-07
[$3000][744584] High CVE-2017-5115: Type confusion in V8. Reported by
                 Marco Giovannini on 2017-07-17
[$TBD][759624] High CVE-2017-5116: Type confusion in V8. Reported Guang
                Gong of Alpha Team, Qihoo 360 on 2017-08-28
[$1000][739190] Medium CVE-2017-5117: Use of uninitialized value in
                 Skia. Reported by Tobias Klein (www.trapkit.de) on
                 2017-07-04
[$1000][747847] Medium CVE-2017-5118: Bypass of Content Security Policy
                 in Blink. Reported by WenXu Wu of Tencent's Xuanwu Lab
                 on 2017-07-24
[$N/A][725127] Medium CVE-2017-5119: Use of uninitialized value in
                Skia. Reported by Anonymous on 2017-05-22
[$N/A][718676] Low CVE-2017-5120: Potential HTTPS downgrade during
                redirect navigation. Reported by Xiaoyin Liu
                (@general_nfs) on 2017-05-05

 We would also like to thank all security researchers that worked with
us during the development cycle to prevent security bugs from ever
reaching the stable channel.

 As usual, our ongoing internal security work was responsible for a
wide range of fixes:

[762099] Various fixes from internal audits, fuzzing and other
          initiatives

Many of our security bugs are detected using AddressSanitizer,
MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity,
libFuzzer, or AFL.

 Interested in switching release channels? Find out how.  If you find a
new issue, please let us know by filing a bug. The community help forum
is also a great place to reach out for help or learn about common
issues.


 Krishna Govind
Google Chrome


==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================



