Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Browsers
Chrome & Chromium
Chrome 78 for Windows, Mac and Linux Released
Message
<blockquote data-quote="Bot" data-source="post: 840885" data-attributes="member: 52014"><p>The Chrome team is delighted to announce the promotion of Chrome 78 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.</p><p></p><p>Chrome 78.0.3904.70 contains a number of fixes and improvements -- a list of changes is available in the<a href="https://chromium.googlesource.com/chromium/src/+log/77.0.3865.120..78.0.3904.70?pretty=fuller&n=10000" target="_blank"> log</a>. Watch out for upcoming<a href="https://chrome.blogspot.com/" target="_blank"> Chrome</a> and<a href="https://blog.chromium.org/" target="_blank"> Chromium</a> blog posts about new features and big efforts delivered in 78.</p><p></p><p></p><p>Security Fixes and Rewards</p><p>This update includes <a href="https://bugs.chromium.org/p/chromium/issues/list?can=1&q=type%3Abug-security+os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows%2Call+label%3ARelease-0-M78" target="_blank">37</a> security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the <a href="https://sites.google.com/a/chromium.org/dev/Home/chromium-security" target="_blank">Chrome Security Page</a> for more information.</p><p></p><p>[$20000][<a href="https://crbug.com/1001503" target="_blank">1001503</a>] High CVE-2019-13699: Use-after-free in media. Reported by Man Yue Mo of Semmle Security Research Team on 2019-09-06</p><p>[$15000][<a href="https://crbug.com/998431" target="_blank">998431</a>] High CVE-2019-13700: Buffer overrun in Blink. Reported by Man Yue Mo of Semmle Security Research Team on 2019-08-28</p><p>[$1000][<a href="https://crbug.com/998284" target="_blank">998284</a>] High CVE-2019-13701: URL spoof in navigation. Reported by David Erceg on 2019-08-27</p><p>[$5000][<a href="https://crbug.com/991125" target="_blank">991125</a>] Medium CVE-2019-13702: Privilege elevation in Installer. Reported by Phillip Langlois (<a href="mailto:phillip.langlois@nccgroup.com">phillip.langlois@nccgroup.com</a>) and Edward Torkington (<a href="mailto:edward.torkington@nccgroup.com">edward.torkington@nccgroup.com</a>), NCC Group on 2019-08-06</p><p>[$3000][<a href="https://crbug.com/992838" target="_blank">992838</a>] Medium CVE-2019-13703: URL bar spoofing. Reported by Khalil Zhani on 2019-08-12</p><p>[$3000][<a href="https://crbug.com/1001283" target="_blank">1001283</a>] Medium CVE-2019-13704: CSP bypass. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-09-05</p><p>[$2000][<a href="https://crbug.com/989078" target="_blank">989078</a>] Medium CVE-2019-13705: Extension permission bypass. Reported by Luan Herrera (@lbherrera_) on 2019-07-30</p><p>[$2000][<a href="https://crbug.com/1001159" target="_blank">1001159</a>] Medium CVE-2019-13706: Out-of-bounds read in PDFium. Reported by pdknsk on 2019-09-05</p><p>[$1000][<a href="https://crbug.com/859349" target="_blank">859349</a>] Medium CVE-2019-13707: File storage disclosure. Reported by Andrea Palazzo on 2018-07-01</p><p>[$1000][<a href="https://crbug.com/931894" target="_blank">931894</a>] Medium CVE-2019-13708: HTTP authentication spoof. Reported by Khalil Zhani on 2019-02-13</p><p>[$1000][<a href="https://crbug.com/1005218" target="_blank">1005218</a>] Medium CVE-2019-13709: File download protection bypass. Reported by Zhong Zhaochen of andsecurity.cn on 2019-09-18</p><p>[$500][<a href="https://crbug.com/756825" target="_blank">756825</a>] Medium CVE-2019-13710: File download protection bypass. Reported by bernardo.mrod on 2017-08-18</p><p>[$500][<a href="https://crbug.com/986063" target="_blank">986063</a>] Medium CVE-2019-13711: Cross-context information leak. Reported by David Erceg on 2019-07-20</p><p>[$500][<a href="https://crbug.com/1004341" target="_blank">1004341</a>] Medium CVE-2019-15903: Buffer overflow in expat. Reported by Sebastian Pipping on 2019-09-16</p><p>[$N/A][<a href="https://crbug.com/993288" target="_blank">993288</a>] Medium CVE-2019-13713: Cross-origin data leak. Reported by David Erceg on 2019-08-13</p><p>[$2000][<a href="https://crbug.com/982812" target="_blank">982812</a>] Low CVE-2019-13714: CSS injection. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-07-10</p><p>[$500][<a href="https://crbug.com/760855" target="_blank">760855</a>] Low CVE-2019-13715: Address bar spoofing. Reported by xisigr of Tencent's Xuanwu Lab on 2017-08-31</p><p>[$500][<a href="https://crbug.com/1005948" target="_blank">1005948</a>] Low CVE-2019-13716: Service worker state error. Reported by Barron Hagerman on 2019-09-19</p><p>[$N/A][<a href="https://crbug.com/839239" target="_blank">839239</a>] Low CVE-2019-13717: Notification obscured. Reported by xisigr of Tencent's Xuanwu Lab on 2018-05-03</p><p>[$N/A][<a href="https://crbug.com/866162" target="_blank">866162</a>] Low CVE-2019-13718: IDN spoof. Reported by Khalil Zhani on 2018-07-20</p><p>[$N/A][<a href="https://crbug.com/927150" target="_blank">927150</a>] Low CVE-2019-13719: Notification obscured. Reported by Khalil Zhani on 2019-01-31</p><p></p><p>We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.</p><p></p><p>As usual, our ongoing internal security work was responsible for a wide range of fixes:</p><ul> <li data-xf-list-type="ul">[<a href="https://crbug.com/1016016" target="_blank">1016016</a>] Various fixes from internal audits, fuzzing and other initiatives</li> </ul><p></p><p>Many of our security bugs are detected using <a href="https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer" target="_blank">AddressSanitizer</a>, <a href="https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer" target="_blank">MemorySanitizer</a>, <a href="https://www.chromium.org/developers/testing/undefinedbehaviorsanitizer" target="_blank">UndefinedBehaviorSanitizer</a>, <a href="https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity" target="_blank">Control Flow Integrity</a>, <a href="https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer" target="_blank">libFuzzer</a>, or <a href="https://github.com/google/afl" target="_blank">AFL</a>.</p><p></p><p>Interested in switching release channels? Find out how <a href="https://www.chromium.org/getting-involved/dev-channel" target="_blank">here</a>. If you find a new issue, please let us know by <a href="https://crbug.com/" target="_blank">filing a bug</a>. The <a href="https://productforums.google.com/forum/#!forum/chrome" target="_blank">community help forum</a> is also a great place to reach out for help or learn about common issues.</p><p></p><p></p><p>Read more: <a href="https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html" target="_blank">Stable Channel Update for Desktop</a></p></blockquote><p></p>
[QUOTE="Bot, post: 840885, member: 52014"] The Chrome team is delighted to announce the promotion of Chrome 78 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks. Chrome 78.0.3904.70 contains a number of fixes and improvements -- a list of changes is available in the[URL='https://chromium.googlesource.com/chromium/src/+log/77.0.3865.120..78.0.3904.70?pretty=fuller&n=10000'] log[/URL]. Watch out for upcoming[URL='https://chrome.blogspot.com/'] Chrome[/URL] and[URL='https://blog.chromium.org/'] Chromium[/URL] blog posts about new features and big efforts delivered in 78. Security Fixes and Rewards This update includes [URL='https://bugs.chromium.org/p/chromium/issues/list?can=1&q=type%3Abug-security+os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows%2Call+label%3ARelease-0-M78']37[/URL] security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the [URL='https://sites.google.com/a/chromium.org/dev/Home/chromium-security']Chrome Security Page[/URL] for more information. [$20000][[URL='https://crbug.com/1001503']1001503[/URL]] High CVE-2019-13699: Use-after-free in media. Reported by Man Yue Mo of Semmle Security Research Team on 2019-09-06 [$15000][[URL='https://crbug.com/998431']998431[/URL]] High CVE-2019-13700: Buffer overrun in Blink. Reported by Man Yue Mo of Semmle Security Research Team on 2019-08-28 [$1000][[URL='https://crbug.com/998284']998284[/URL]] High CVE-2019-13701: URL spoof in navigation. Reported by David Erceg on 2019-08-27 [$5000][[URL='https://crbug.com/991125']991125[/URL]] Medium CVE-2019-13702: Privilege elevation in Installer. Reported by Phillip Langlois ([email]phillip.langlois@nccgroup.com[/email]) and Edward Torkington ([email]edward.torkington@nccgroup.com[/email]), NCC Group on 2019-08-06 [$3000][[URL='https://crbug.com/992838']992838[/URL]] Medium CVE-2019-13703: URL bar spoofing. Reported by Khalil Zhani on 2019-08-12 [$3000][[URL='https://crbug.com/1001283']1001283[/URL]] Medium CVE-2019-13704: CSP bypass. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-09-05 [$2000][[URL='https://crbug.com/989078']989078[/URL]] Medium CVE-2019-13705: Extension permission bypass. Reported by Luan Herrera (@lbherrera_) on 2019-07-30 [$2000][[URL='https://crbug.com/1001159']1001159[/URL]] Medium CVE-2019-13706: Out-of-bounds read in PDFium. Reported by pdknsk on 2019-09-05 [$1000][[URL='https://crbug.com/859349']859349[/URL]] Medium CVE-2019-13707: File storage disclosure. Reported by Andrea Palazzo on 2018-07-01 [$1000][[URL='https://crbug.com/931894']931894[/URL]] Medium CVE-2019-13708: HTTP authentication spoof. Reported by Khalil Zhani on 2019-02-13 [$1000][[URL='https://crbug.com/1005218']1005218[/URL]] Medium CVE-2019-13709: File download protection bypass. Reported by Zhong Zhaochen of andsecurity.cn on 2019-09-18 [$500][[URL='https://crbug.com/756825']756825[/URL]] Medium CVE-2019-13710: File download protection bypass. Reported by bernardo.mrod on 2017-08-18 [$500][[URL='https://crbug.com/986063']986063[/URL]] Medium CVE-2019-13711: Cross-context information leak. Reported by David Erceg on 2019-07-20 [$500][[URL='https://crbug.com/1004341']1004341[/URL]] Medium CVE-2019-15903: Buffer overflow in expat. Reported by Sebastian Pipping on 2019-09-16 [$N/A][[URL='https://crbug.com/993288']993288[/URL]] Medium CVE-2019-13713: Cross-origin data leak. Reported by David Erceg on 2019-08-13 [$2000][[URL='https://crbug.com/982812']982812[/URL]] Low CVE-2019-13714: CSS injection. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-07-10 [$500][[URL='https://crbug.com/760855']760855[/URL]] Low CVE-2019-13715: Address bar spoofing. Reported by xisigr of Tencent's Xuanwu Lab on 2017-08-31 [$500][[URL='https://crbug.com/1005948']1005948[/URL]] Low CVE-2019-13716: Service worker state error. Reported by Barron Hagerman on 2019-09-19 [$N/A][[URL='https://crbug.com/839239']839239[/URL]] Low CVE-2019-13717: Notification obscured. Reported by xisigr of Tencent's Xuanwu Lab on 2018-05-03 [$N/A][[URL='https://crbug.com/866162']866162[/URL]] Low CVE-2019-13718: IDN spoof. Reported by Khalil Zhani on 2018-07-20 [$N/A][[URL='https://crbug.com/927150']927150[/URL]] Low CVE-2019-13719: Notification obscured. Reported by Khalil Zhani on 2019-01-31 We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. As usual, our ongoing internal security work was responsible for a wide range of fixes: [LIST] [*][[URL='https://crbug.com/1016016']1016016[/URL]] Various fixes from internal audits, fuzzing and other initiatives [/LIST] Many of our security bugs are detected using [URL='https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer']AddressSanitizer[/URL], [URL='https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer']MemorySanitizer[/URL], [URL='https://www.chromium.org/developers/testing/undefinedbehaviorsanitizer']UndefinedBehaviorSanitizer[/URL], [URL='https://sites.google.com/a/chromium.org/dev/developers/testing/control-flow-integrity']Control Flow Integrity[/URL], [URL='https://sites.google.com/a/chromium.org/dev/developers/testing/libfuzzer']libFuzzer[/URL], or [URL='https://github.com/google/afl']AFL[/URL]. Interested in switching release channels? Find out how [URL='https://www.chromium.org/getting-involved/dev-channel']here[/URL]. If you find a new issue, please let us know by [URL='https://crbug.com/']filing a bug[/URL]. The [URL='https://productforums.google.com/forum/#!forum/chrome']community help forum[/URL] is also a great place to reach out for help or learn about common issues. Read more: [URL="https://chromereleases.googleblog.com/2019/10/stable-channel-update-for-desktop_22.html"]Stable Channel Update for Desktop[/URL] [/QUOTE]
Insert quotes…
Verification
Post reply
Top