CERTsSecurity

ESB-2023.6314 – [Win][UNIX/Linux] Google Chrome: CVSS (Max): None

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2023.6314
Stable Channel Update for Desktop
1 November 2023

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: Google Chrome
Publisher: Google
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Resolution: Patch/Upgrade
CVE Names: CVE-2023-5859 CVE-2023-5858 CVE-2023-5857
CVE-2023-5856 CVE-2023-5855 CVE-2023-5854
CVE-2023-5853 CVE-2023-5852 CVE-2023-5851
CVE-2023-5850 CVE-2023-5849 CVE-2023-5482
CVE-2023-5480

Original Bulletin:
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html

Comment: CVSS (Max): None available when published

– ————————–BEGIN INCLUDED TEXT——————–

Stable Channel Update for Desktop

Tuesday, October 31, 2023

The Chrome team is delighted to announce the promotion of Chrome 119 to the
stable channel for Windows, Mac and Linux. This will roll out over the coming
days/weeks.

Chrome 119.0.6045.105 (Linux and Mac), 119.0.6045.105/.106( Windows) contains a
number of fixes and improvements — a list of changes is available in the log.
Watch out for upcoming Chrome and Chromium blog posts about new features and
big efforts delivered in 119.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority
of users are updated with a fix. We will also retain restrictions if the bug
exists in a third party library that other projects similarly depend on, but
haven’t yet fixed.

This update includes 15 security fixes. Below, we highlight fixes that were
contributed by external researchers. Please see the Chrome Security Page for
more information.

[$16000][1492698] High CVE-2023-5480: Inappropriate implementation in Payments.
Reported by Vsevolod Kokorin (Slonser) of Solidlab on 2023-10-14

[$11000][1492381] High CVE-2023-5482: Insufficient data validation in USB.
Reported by DarkNavy on 2023-10-13

[$TBD][1492384] High CVE-2023-5849: Integer overflow in USB. Reported by
DarkNavy on 2023-10-13

[$3000][1281972] Medium CVE-2023-5850: Incorrect security UI in Downloads.
Reported by Mohit Raj (shadow2639) on 2021-12-22

[$3000][1473957] Medium CVE-2023-5851: Inappropriate implementation in
Downloads. Reported by Shaheen Fazim on 2023-08-18

[$2000][1480852] Medium CVE-2023-5852: Use after free in Printing. Reported by
[pwn2car] on 2023-09-10

[$1000][1456876] Medium CVE-2023-5853: Incorrect security UI in Downloads.
Reported by Hafiizh on 2023-06-22

[$1000][1488267] Medium CVE-2023-5854: Use after free in Profiles. Reported by
Dohyun Lee (@l33d0hyun) of SSD-Disclosure Labs & DNSLab, Korea Univ on
2023-10-01

[$TBD][1492396] Medium CVE-2023-5855: Use after free in Reading Mode. Reported
by ChaobinZhang on 2023-10-13

[$TBD][1493380] Medium CVE-2023-5856: Use after free in Side Panel. Reported by
Weipeng Jiang (@Krace) of VRI on 2023-10-17

[N/A][1493435] Medium CVE-2023-5857: Inappropriate implementation in Downloads.
Reported by Will Dormann on 2023-10-18

[$3000][1457704] Low CVE-2023-5858: Inappropriate implementation in WebApp
Provider. Reported by Axel Chong on 2023-06-24

[$500][1482045] Low CVE-2023-5859: Incorrect security UI in Picture In Picture.
Reported by Junsung Lee on 2023-09-13

We would also like to thank all security researchers that worked with us during
the development cycle to prevent security bugs from ever reaching the stable
channel.

As usual, our ongoing internal security work was responsible for a wide range
of fixes:

o [1497743] Various fixes from internal audits, fuzzing and other initiatives

Many of our security bugs are detected using AddressSanitizer, MemorySanitizer,
UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.

Interested in switching release channels? Find out how here. If you find a new
issue, please let us know by filing a bug. The community help forum is also a
great place to reach out for help or learn about common issues.

Prudhvikumar Bommana
Google Chrome

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: https://auscert.org.au/gpg-key/
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=Sx/A
—–END PGP SIGNATURE—–Security BulletinsRead More