
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN296
_____________________________________________________________________

DATE                : 22/05/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Google Chrome versions prior to 83.

=====================================================================
https://chromereleases.googleblog.com/2020/05/stable-channel-update-for-desktop_19.html
_____________________________________________________________________


Stable Channel Update for Desktop
Tuesday, May 19, 2020


The Chrome team is delighted to announce the promotion of Chrome 83 to
the stable channel for Windows, Mac and Linux. This will roll out over
the coming days/weeks.

Chrome 83.0.4103.61 contains a number of fixes and improvements -- a
list of changes is available in the log. Watch out for upcoming Chrome
and Chromium blog posts about new features and big efforts delivered in
83


Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a
majority of users are updated with a fix. We will also retain
restrictions if the bug exists in a third party library that other
projects similarly depend on, but haven’t yet fixed.

This update includes 38 security fixes. Below, we highlight fixes that
were contributed by external researchers. Please see the Chrome Security
Page for more information.


[$20000][1073015] High CVE-2020-6465: Use after free in reader mode.
Reported by Woojin Oh(@pwn_expoit) of STEALIEN on 2020-04-21

[$15000][1074706] High CVE-2020-6466: Use after free in media. Reported
by Zhe Jin from cdsrc of Qihoo 360 on 2020-04-26

[$7500][1068084] High CVE-2020-6467: Use after free in WebRTC. Reported
by ZhanJia Song on 2020-04-06

[$7500][1076708] High CVE-2020-6468: Type Confusion in V8. Reported by
Chris Salls and Jake Corina of Seaside Security, Chani Jindal of
Shellphish on 2020-04-30

[$5000][1067382] High CVE-2020-6469: Insufficient policy enforcement in
developer tools. Reported by David Erceg on 2020-04-02

[$5000][1065761] Medium CVE-2020-6470: Insufficient validation of
untrusted input in clipboard. Reported by Michał Bentkowski of Securitum
on 2020-03-30

[$3000][1059577] Medium CVE-2020-6471: Insufficient policy enforcement
in developer tools. Reported by David Erceg on 2020-03-08

[$3000][1064519] Medium CVE-2020-6472: Insufficient policy enforcement
in developer tools. Reported by David Erceg on 2020-03-25

[$2000][1049510] Medium CVE-2020-6473: Insufficient policy enforcement
in Blink. Reported by Soroush Karami and Panagiotis Ilia on 2020-02-06

[$2000][1059533] Medium CVE-2020-6474: Use after free in Blink. Reported
by Zhe Jin from cdsrc of Qihoo 360 on 2020-03-07

[$1000][1020026] Medium CVE-2020-6475: Incorrect security UI in full
screen. Reported by Khalil Zhani on 2019-10-31

[$1000][1035315] Medium CVE-2020-6476: Insufficient policy enforcement
in tab strip. Reported by Alexandre Le Borgne on 2019-12-18

[$500][946156] Medium CVE-2020-6477: Inappropriate implementation in
installer. Reported by RACK911 Labs on 2019-03-26

[$500][1037730] Medium CVE-2020-6478: Inappropriate implementation in
full screen. Reported by Khalil Zhani on 2019-12-24

[$500][1041749] Medium CVE-2020-6479: Inappropriate implementation in
sharing. Reported by Zhong Zhaochen of andsecurity.cn on 2020-01-14

[$500][1054966] Medium CVE-2020-6480: Insufficient policy enforcement in
enterprise. Reported by Marvin Witt on 2020-02-21

[$500][1068531] Medium CVE-2020-6481: Insufficient policy enforcement in
URL formatting. Reported by Rayyan Bijoora on 2020-04-07

[$TBD][795595] Medium CVE-2020-6482: Insufficient policy enforcement in
developer tools. Reported by Abdulrahman Alqabandi (@qab) on 2017-12-17

[$TBD][966507] Medium CVE-2020-6483: Insufficient policy enforcement in
payments. Reported by Jun Kokatsu, Microsoft Browser Vulnerability
Research on 2019-05-23

[$N/A][1045787] Medium CVE-2020-6484: Insufficient data validation in
ChromeDriver. Reported by Artem Zinenko on 2020-01-26

[$N/A][1047285] Medium CVE-2020-6485: Insufficient data validation in
media router. Reported by Sergei Glazunov of Google Project Zero on
2020-01-30

[$TBD][1055524] Medium CVE-2020-6486: Insufficient policy enforcement in
navigations. Reported by David Erceg on 2020-02-24

[$500][539938] Low CVE-2020-6487: Insufficient policy enforcement in
downloads. Reported by Jun Kokatsu (@shhnjk) on 2015-10-06

[$500][1044277] Low CVE-2020-6488: Insufficient policy enforcement in
downloads. Reported by David Erceg on 2020-01-21

[$500][1050756] Low CVE-2020-6489: Inappropriate implementation in
developer tools. Reported by @lovasoa (Ophir LOJKINE) on 2020-02-10

[$TBD][1035887] Low CVE-2020-6490: Insufficient data validation in
loader. Reported by Twitter on 2019-12-19

[$N/A][1050011] Low CVE-2020-6491: Incorrect security UI in site
information. Reported by Sultan Haikal M.A on 2020-02-07

We would also like to thank all security researchers that worked with us
during the development cycle to prevent security bugs from ever reaching
the stable channel.

As usual, our ongoing internal security work was responsible for a wide
range of fixes:


    [1084009] Various fixes from internal audits, fuzzing and other
initiatives


Many of our security bugs are detected using AddressSanitizer,
MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity,
libFuzzer, or AFL.


Interested in switching release channels?  Find out how here. If you
find a new issue, please let us know by filing a bug. The community help
forum is also a great place to reach out for help or learn about common
issues.



Thank you,

Srinivas Sista

=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================


