-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2010.0163.2
                 Google have released an update for Chrome
                                7 July 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Linux variants
                      Mac OS X
                      Windows
Impact/Access:        Denial of Service -- Remote with User Interaction
                      Reduced Security  -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2010-2652 CVE-2010-2651 CVE-2010-2650
                      CVE-2010-2649 CVE-2010-2648 CVE-2010-2647
                      CVE-2010-2646 CVE-2010-2645 
Member content until: Thursday, August  5 2010

Revision History:     July 7 2010: Added CVE references
                      July 6 2010: Initial Release

OVERVIEW

        Google have released an update for Chrome, correcting several security 
        vulnerabilities.


IMPACT

        The vendor has provided the following information regarding these
        vulnerabilities [1]:
        
            * [42396] Low OOB read with WebGL. Credit to Sergey Glazunov; 
              Google Chrome Security Team (SkyLined).
            * [42575] [42980] Medium Isolate sandboxed iframes more strongly. 
              Credit to sirdarckcat of Google Security Team.
            * [$500] [43488] High Memory corruption with invalid SVGs. Credit 
              to Aki Hekin of OUSPG; wushi of team509.
            * [$500] [44424] High Memory corruption in bidi algorithm. Credit 
              to wushi of team509.
            * [45164] Low Crash with invalid image. Credit to Jose A. Vazquez.
            * [$1000] [45983] High Memory corruption with invalid PNG (libpng 
              bug). Credit to Aki Helin of OUSPG.
            * [$500] [46360] High Memory corruption in CSS style rendering. 
              Credit to wushi of team509.
            * [46575] Low Annoyance with print dialogs. Credit to Mats 
              Ahlgren.
            * [47056] Low Crash with modal dialogs. Credit to Aki Helin of 
              OUSPG.


MITIGATION

        The latest version of Google Chrome can be downloaded from the
        vendor's website. [2]
                                
        The update can also be applied from within Google Chrome using 
        the built in update feature.


REFERENCES

        [1] Stable Channel Update
            http://googlechromereleases.blogspot.com/search/label/Stable%20updates

        [2] Google Chrome
            http://www.google.com/chrome

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFMM+j4/iFOrG6YcBERAr33AKDT34+E2neEteI3CGCQCaf23IOl7gCgnYD0
WBkScPNsE2rwIIV2bSU9y1w=
=Htw2
-----END PGP SIGNATURE-----