-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2020.0070
          Google Chrome for Desktop version 81.0.4044.92 released
                               8 April 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Google Chrome
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Unknown/Unspecified
                      Denial of Service               -- Unknown/Unspecified
                      Reduced Security                -- Unknown/Unspecified
Resolution:           Patch/Upgrade
CVE Names:            CVE-2020-6456 CVE-2020-6455 CVE-2020-6454
                      CVE-2020-6448 CVE-2020-6447 CVE-2020-6446
                      CVE-2020-6445 CVE-2020-6444 CVE-2020-6443
                      CVE-2020-6442 CVE-2020-6441 CVE-2020-6440
                      CVE-2020-6439 CVE-2020-6438 CVE-2020-6437
                      CVE-2020-6436 CVE-2020-6435 CVE-2020-6434
                      CVE-2020-6433 CVE-2020-6432 CVE-2020-6431
                      CVE-2020-6430 CVE-2020-6423 
Member content until: Friday, May  8 2020

OVERVIEW

        Google has released Chrome version 81.0.4044.92 for desktop, which includes 32 security fixes [1]


IMPACT

        Google has provided the following information regarding the vulnerabilities addressed:
        
        "This update includes 32 security fixes. Below, we highlight fixes that were
        contributed by external researchers. Please see the Chrome Security Page for
        more information.
        
        
        [$7500][1019161] High CVE-2020-6454: Use after free in extensions. Reported by
        Leecraso and Guang Gong of Alpha Lab, Qihoo 360 on 2019-10-29
        [$5000][1043446] High CVE-2020-6423: Use after free in audio. Reported by
        Anonymous on 2020-01-18
        [$3000][1059669] High CVE-2020-6455: Out of bounds read in WebSQL. Reported by
        Nan Wang(@eternalsakura13) and Guang Gong of Alpha Lab, Qihoo 360 on 2020-03-09
        [$2000][1031479] Medium CVE-2020-6430: Type Confusion in V8. Reported by Avihay
        Cohen @ SeraphicAlgorithms on 2019-12-06
        [$2000][1040755] Medium CVE-2020-6456: Insufficient validation of untrusted
        input in clipboard. Reported by Micha? Bentkowski of Securitum on 2020-01-10
        [$1000][852645] Medium CVE-2020-6431: Insufficient policy enforcement in full
        screen. Reported by Luan Herrera (@lbherrera_) on 2018-06-14
        [$1000][965611] Medium CVE-2020-6432: Insufficient policy enforcement in
        navigations. Reported by David Erceg on 2019-05-21
        [$1000][1043965] Medium CVE-2020-6433: Insufficient policy enforcement in
        extensions. Reported by David Erceg on 2020-01-21
        [$500][1048555] Medium CVE-2020-6434: Use after free in devtools. Reported by
        HyungSeok Han (DaramG) of Theori on 2020-02-04
        [$N/A][1032158] Medium CVE-2020-6435: Insufficient policy enforcement in
        extensions. Reported by Sergei Glazunov of Google Project Zero on 2019-12-09
        [$TBD][1034519] Medium CVE-2020-6436: Use after free in window management. 
        Reported by Igor Bukanov from Vivaldi on 2019-12-16
        [$500][639173] Low CVE-2020-6437: Inappropriate implementation in WebView. 
        Reported by Jann Horn on 2016-08-19
        [$500][714617] Low CVE-2020-6438: Insufficient policy enforcement in
        extensions. Reported by Ng Yik Phang on 2017-04-24
        [$500][868145] Low CVE-2020-6439: Insufficient policy enforcement in
        navigations. Reported by remkoboonstra on 2018-07-26
        [$500][894477] Low CVE-2020-6440: Inappropriate implementation in extensions. 
        Reported by David Erceg on 2018-10-11
        [$500][959571] Low CVE-2020-6441: Insufficient policy enforcement in omnibox. 
        Reported by David Erceg on 2019-05-04
        [$500][1013906] Low CVE-2020-6442: Inappropriate implementation in cache. 
        Reported by B@rMey on 2019-10-12
        [$500][1040080] Low CVE-2020-6443: Insufficient data validation in developer
        tools. Reported by @lovasoa (Ophir LOJKINE) on 2020-01-08
        [$N/A][922882] Low CVE-2020-6444: Uninitialized Use in WebRTC. Reported by
        mlfbrown on 2019-01-17
        [$N/A][933171] Low CVE-2020-6445: Insufficient policy enforcement in trusted
        types. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on
        2019-02-18
        [$N/A][933172] Low CVE-2020-6446: Insufficient policy enforcement in trusted
        types. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on
        2019-02-18
        [$N/A][991217] Low CVE-2020-6447: Inappropriate implementation in developer
        tools. Reported by David Erceg on 2019-08-06
        [$N/A][1037872] Low CVE-2020-6448: Use after free in V8. Reported by Guang Gong
        of Alpha Lab, Qihoo 360 on 2019-12-26
        
        
        Thanks also to Hosein Askari for identifying a vulnerability with the Chromium
        website.
        
        
        We would also like to thank all security researchers that worked with us during
        the development cycle to prevent security bugs from ever reaching the stable
        channel.
        
        As usual, our ongoing internal security work was responsible for a wide range
        of fixes:
        
          * [1067891] Various fixes from internal audits, fuzzing and other initiatives" [1]


MITIGATION

        It is recommended to update to version 81.0.4044.92 or later.


REFERENCES

        [1] Stable Channel Update for Desktop
            http://feedproxy.google.com/~r/blogspot/dbusP/~3/ABV8qh3fEkI/stable-channel-update-for-desktop_7.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXo1lN2aOgq3Tt24GAQj0Xw/+MW4CESscvhcJXTu5KTwqxKeTLb6DVp5d
gIRg0QBV1AYIRutm0cHGbhwoLTquI+KOwO/1Dqejv8LKXeIn/19wBlbSJMAcXl71
ZKllUTardbrMuwZo9d7kgQE1rw1arfdpouGz0Hx3Bb7vjakQKQ++zrD3huW9zcBY
Cavk5oY9LNCh7F0A17M66sorbJBX6W0RsF7EN3dS0lZxSptowNldtqP8LEeTodEv
5G9T/+1DP1SkKhNatNr32iY9/OJrWNCg+Lgu5BcD5XqgIcrrqmrdWn1OSTQWWqG+
1iJO8xyeVsgw2JuSFpy1/rIEU7Ozr0VXWV45wM7tGnm9LqsJ/QvgGNfC35nuClL0
JW4Qp21OPQsbMorRilO1Ua0aGtQwDcRDt8UwIKRR2FePn17KGtl5nFa1oMg3tVMU
LqmuJzlRKs/4dOamRk6Iu51RDYIPo32dFS+5OyN6ETzdrO5Nw9KS2TxYJ3EFYBDm
/93ZuhKXp8VnCa0X0jEbWW30zFm8Klu3DmoBoGs2qm9hfRcAnTV5tme4gyMLdNHh
SmFq+yrTbCcRacGd4JWO/rjQyGf/4BjWbejMGg2eTdJhp4ZgXWJbLvlTvs9Qj7Zp
5H2H0g16vo6IB4beOX0yyLB/qylVODfVV6YX7ua2TTU5jHs80lpNAyyC817MLsp1
zB+jp6pdUmA=
=bD88
-----END PGP SIGNATURE-----