
=====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN577
_____________________________________________________________________

DATE                : 29/10/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Google Chrome versions prior to
                                  95.0.4638.69.

=====================================================================
https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_28.html
_____________________________________________________________________


Stable Channel Update for Desktop
Thursday, October 28, 2021

The Stable channel has been updated to 95.0.4638.69 for Windows, Mac and
Linux which will roll out over the coming days/weeks.

A full list of changes in this build is available in the log. Interested
in switching release channels? Find out how here. If you find a new
issue, please let us know by filing a bug. The community help forum is
also a great place to reach out for help or learn about common issues.


Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a
majority of users are updated with a fix. We will also retain
restrictions if the bug exists in a third party library that other
projects similarly depend on, but haven’t yet fixed.


This update includes 8 security fixes. Below, we highlight fixes that
were contributed by external researchers. Please see the Chrome Security
Page for more information.


[$10000][1259864] High CVE-2021-37997 : Use after free in Sign-In.
Reported by Wei Yuan of MoyunSec VLab on 2021-10-14

[$7500][1259587] High CVE-2021-37998 : Use after free in Garbage
Collection. Reported by Cassidy Kim of Amber Security Lab, OPPO Mobile
Telecommunications Corp. Ltd. on 2021-10-13

[$1000][1251541] High CVE-2021-37999 : Insufficient data validation in
New Tab Page. Reported by Ashish Arun Dhone on 2021-09-21

[$N/A][1249962] High CVE-2021-38000 : Insufficient validation of
untrusted input in Intents. Reported by Clement Lecigne, Neel Mehta, and
Maddie Stone of Google Threat Analysis Group on 2021-09-15

[$N/A][1260577] High CVE-2021-38001 : Type Confusion in V8. Reported by
Kunlun Lab via Tianfu Cup on 2021-10-16

[$N/A][1260940] High CVE-2021-38002 : Use after free in Web Transport.
Reported by @__R0ng of 360 Alpha Lab, 漏洞研究院青训队 via Tianfu Cup on
2021-10-16

[$TBD][1263462] High CVE-2021-38003 : Inappropriate implementation in
V8. Reported by Clément Lecigne from Google TAG and Samuel Groß from
Google Project Zero on 2021-10-26


Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003
exist in the wild.

We would also like to thank all security researchers that worked with us
during the development cycle to prevent security bugs from ever reaching
the stable channel.


As usual, our ongoing internal security work was responsible for a wide
range of fixes:

[1264537] Various fixes from internal audits, fuzzing and other
initiatives


We would also like to thank all security researchers that worked with us
during the development cycle to prevent security bugs from ever reaching
the stable channel.

Many of our security bugs are detected using AddressSanitizer,
MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity,
libFuzzer, or AFL.

Interested in switching release channels?  Find out how here. If you
find a new issue, please let us know by filing a bug. The community help
forum is also a great place to reach out for help or learn about common
issues.


Prudhvikumar Bommana
Google Chrome

=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


