-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.1411
                     Stable Channel Update for Desktop
                               1 April 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Google Chrome
Publisher:         Google
Operating System:  UNIX variants (UNIX, Linux, OSX)
                   Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2022-1146 CVE-2022-1145 CVE-2022-1144
                   CVE-2022-1143 CVE-2022-1142 CVE-2022-1141
                   CVE-2022-1139 CVE-2022-1138 CVE-2022-1137
                   CVE-2022-1136 CVE-2022-1135 CVE-2022-1134
                   CVE-2022-1133 CVE-2022-1132 CVE-2022-1131
                   CVE-2022-1130 CVE-2022-1129 CVE-2022-1128
                   CVE-2022-1127 CVE-2022-1125 

Original Bulletin: 
   https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html

Comment: CVSS (Max):  None available when published

- --------------------------BEGIN INCLUDED TEXT--------------------

Stable Channel Update for Desktop

Tuesday, March 29, 2022 

The Chrome team is delighted to announce the promotion of Chrome 100 to the  
stable channel for Windows, Mac and Linux. Chrome 100 is also promoted to  
our new extended stable channel for Windows and Mac. This will roll out  
over the coming days/weeks.

Chrome 100.0.4896.60 contains a number of fixes and improvements -- a list  
of changes is available in the log. Watch out for upcoming Chrome and  
Chromium blog posts about new features and big efforts delivered in 100.


Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a  
majority of users are updated with a fix. We will also retain restrictions  
if the bug exists in a third party library that other projects similarly  
depend on, but haven't yet fixed.


This update includes 28 security fixes. Below, we highlight fixes that were  
contributed by external researchers. Please see the Chrome Security Page  
for more information.


[$7000][1292261] High CVE-2022-1125: Use after free in Portals. Reported by  
Khalil Zhani on 2022-01-29

[$5000][1291891] High CVE-2022-1127: Use after free in QR Code Generator.  
Reported by anonymous on 2022-01-28

[$5000][1301920] High CVE-2022-1128: Inappropriate implementation in Web  
Share API. Reported by Abdel Adim (@smaury92) Oisfi of Shielder on  
2022-03-01

[$3000][1300253] High CVE-2022-1129: Inappropriate implementation in Full  
Screen Mode. Reported by Irvan Kurniawan (sourc7) on 2022-02-24

[$1000][1142269] High CVE-2022-1130: Insufficient validation of untrusted  
input in WebOTP. Reported by Sergey Toshin of Oversecurity Inc.  on  
2020-10-25

[$NA][1297404] High CVE-2022-1131: Use after free in Cast UI. Reported by  
Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research on  
2022-02-15

[$TBD][1303410] High CVE-2022-1132: Inappropriate implementation in Virtual  
Keyboard. Reported by Andr.Ess on 2022-03-07

[$TBD][1305776] High CVE-2022-1133: Use after free in WebRTC. Reported by  
Anonymous on 2022-03-13

[$TBD][1308360] High CVE-2022-1134: Type Confusion in V8. Reported by Man  
Yue Mo of GitHub Security Lab on 2022-03-21

[$16000][1285601] Medium CVE-2022-1135: Use after free in Shopping Cart.  
Reported by Wei Yuan of MoyunSec VLab on 2022-01-09

[$7000][1280205] Medium CVE-2022-1136: Use after free in Tab Strip .  
Reported by Krace on 2021-12-15

[$5000][1289846] Medium CVE-2022-1137: Inappropriate implementation in  
Extensions. Reported by Thomas Orlita  on 2022-01-22

[$2000][1246188] Medium CVE-2022-1138: Inappropriate implementation in Web  
Cursor. Reported by Alesandro Ortiz on 2021-09-03

[$TBD][1268541] Medium CVE-2022-1139: Inappropriate implementation in  
Background Fetch API. Reported by Maurice Dauer  on 2021-11-10

[$TBD][1303253] Medium CVE-2022-1141: Use after free in File Manager.  
Reported by raven at KunLun lab on 2022-03-05

[$TBD][1303613] Medium CVE-2022-1142: Heap buffer overflow in WebUI.  
Reported by Leecraso and Guang Gong of 360 Alpha Lab on 2022-03-07

[$TBD][1303615] Medium CVE-2022-1143: Heap buffer overflow in WebUI.  
Reported by Leecraso and Guang Gong of 360 Alpha Lab on 2022-03-07

[$TBD][1304145] Medium CVE-2022-1144: Use after free in WebUI. Reported by  
Leecraso and Guang Gong of 360 Alpha Lab on 2022-03-08

[$TBD][1304545] Medium CVE-2022-1145: Use after free in Extensions.  
Reported by Yakun Zhang of Baidu Security on 2022-03-09

[$TBD][1290150] Low CVE-2022-1146: Inappropriate implementation in Resource  
Timing. Reported by Sohom Datta on 2022-01-23


We would also like to thank all security researchers that worked with us  
during the development cycle to prevent security bugs from ever reaching  
the stable channel.

As usual, our ongoing internal security work was responsible for a wide  
range of fixes:


[1311327] Various fixes from internal audits, fuzzing and other initiatives


Many of our security bugs are detected using AddressSanitizer,  
MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity,  
libFuzzer, or AFL.


Interested in switching release channels?  Find out how here. If you find a  
new issue, please let us know by filing a bug. The community help forum is  
also a great place to reach out for help or learn about common issues.


Srinivas Sista
Google Chrome

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=AKDf
-----END PGP SIGNATURE-----