Security Experts:

Chrome 80 Released With 56 Security Fixes

Google this week released Chrome 80 to the stable channel with 56 vulnerability patches and various other improvements to user security.

To better protect from cross-site request forgery (CSRF) attacks, Chrome 80 will enforce a new secure-by-default cookie classification system, where only cookies set as SameSite=None; Secure will be available in third-party contexts, as long as they are accessed from secure connections.

The change, initially announced in May 2019, is set to enter into effect later this month, when Chrome will treat cookies that have no declared SameSite value as SameSite=Lax cookies. The changes will initially be seen by only a small set of users.

The new browser release also deprecates FTP support, since the implementation does not support secure connections or proxies, and because usage is low. Google plans to disable FTP by default in the next Chrome iteration and will completely remove support for it in Chrome 82.

Chrome 80, which comes with version 8 of the V8 JavaScript engine, autoupdates mixed audio and video resources to HTTPS and blocks them if they fail to load over a secure connection. Mixed images are still allowed to load, but the browser will display a “Not Secure” warning in the omnibox.

As Google announced in October last year, Chrome 81 will autoupdate mixed images to HTTPS, or will block them if they fail to load over a secure connection.

Google has been advocating for the adoption of HTTPS for a long time, and the autoupdating of mixed content is only one of the steps it’s taking to get website owners to transition to encrypted connections.

Of the 56 patches included in the new release — which is rolling out to Windows, Mac and Linux as Chrome 80.0.3987.87 — 37 address vulnerabilities that were reported by external researchers. These include 10 flaws rated high severity, 17 considered medium risk, and 10 low severity bugs.

The high severity issues include an integer overflow in JavaScript (CVE-2020-6381), type confusion in JavaScript (CVE-2020-6382), multiple bugs in XML (CVE-2019-18197), inappropriate implementation in SQLite (CVE-2019-19926), insufficient policy enforcement in storage (CVE-2020-6385), flaws in SQLite (CVE-2019-19880, CVE-2019-19925), out of bounds write in WebRTC (CVE-2020-6387, CVE-2020-6389), and out of bounds memory access in WebAudio (CVE-2020-6388) and streams (CVE-2020-6390).

Medium risk bugs addressed in Chrome 80 include insufficient validations of untrusted input in Blink and Omnibox; insufficient policy enforcements in extensions, Blink, AppCache, and downloads; out of bounds reads in JavaScript and SQLite; inappropriate implementations in Skia, CORS, and Blink; incorrect security UIs in sharing and Omnibox; uninitialized use in PDFium; use after free in audio, and out of bounds memory access in SQLite.

As for the low risk vulnerabilities patched in the browser, they include insufficient policy enforcements in CORS, navigation and Safe Browsing; inappropriate implementations in Omnibox, Blink, JavaScript, and installer; insufficient validations of untrusted input in Omnibox; and insufficient data validation in streams.

Google paid a total of $48,000 in bug bounty rewards to the reporting researchers, but it has yet to reveal the amounts awarded for some of the addressed vulnerabilities.

Related: Chrome 79 Patches Critical Vulnerabilities

Related: Chrome 78 Released With DoH, 37 Security Patches

view counter