Google this week released Chrome 80 to the stable channel with 56 vulnerability patches and various other improvements to user security.
To better protect from cross-site request forgery (CSRF) attacks, Chrome 80 will enforce a new secure-by-default cookie classification system, where only cookies set as SameSite=None; Secure will be available in third-party contexts, as long as they are accessed from secure connections.
The change, initially announced in May 2019, is set to enter into effect later this month, when Chrome will treat cookies that have no declared SameSite value as SameSite=Lax cookies. The changes will initially be seen by only a small set of users.
The new browser release also deprecates FTP support, since the implementation does not support secure connections or proxies, and because usage is low. Google plans to disable FTP by default in the next Chrome iteration and will completely remove support for it in Chrome 82.
Chrome 80, which comes with version 8 of the V8 JavaScript engine, autoupdates mixed audio and video resources to HTTPS and blocks them if they fail to load over a secure connection. Mixed images are still allowed to load, but the browser will display a “Not Secure” warning in the omnibox.
As Google announced in October last year, Chrome 81 will autoupdate mixed images to HTTPS, or will block them if they fail to load over a secure connection.
Google has been advocating for the adoption of HTTPS for a long time, and the autoupdating of mixed content is only one of the steps it’s taking to get website owners to transition to encrypted connections.
Of the 56 patches included in the new release — which is rolling out to Windows, Mac and Linux as Chrome 80.0.3987.87 — 37 address vulnerabilities that were reported by external researchers. These include 10 flaws rated high severity, 17 considered medium risk, and 10 low severity bugs.
The high severity issues include an integer overflow in JavaScript (CVE-2020-6381), type confusion in JavaScript (CVE-2020-6382), multiple bugs in XML (CVE-2019-18197), inappropriate implementation in SQLite (CVE-2019-19926), insufficient policy enforcement in storage (CVE-2020-6385), flaws in SQLite (CVE-2019-19880, CVE-2019-19925), out of bounds write in WebRTC (CVE-2020-6387, CVE-2020-6389), and out of bounds memory access in WebAudio (CVE-2020-6388) and streams (CVE-2020-6390).
Medium risk bugs addressed in Chrome 80 include insufficient validations of untrusted input in Blink and Omnibox; insufficient policy enforcements in extensions, Blink, AppCache, and downloads; out of bounds reads in JavaScript and SQLite; inappropriate implementations in Skia, CORS, and Blink; incorrect security UIs in sharing and Omnibox; uninitialized use in PDFium; use after free in audio, and out of bounds memory access in SQLite.
As for the low risk vulnerabilities patched in the browser, they include insufficient policy enforcements in CORS, navigation and Safe Browsing; inappropriate implementations in Omnibox, Blink, JavaScript, and installer; insufficient validations of untrusted input in Omnibox; and insufficient data validation in streams.
Google paid a total of $48,000 in bug bounty rewards to the reporting researchers, but it has yet to reveal the amounts awarded for some of the addressed vulnerabilities.
Related: Chrome 79 Patches Critical Vulnerabilities
Related: Chrome 78 Released With DoH, 37 Security Patches

More from Ionut Arghire
- European Telecommunications Standards Institute Discloses Data Breach
- Johnson Controls Ransomware Attack Could Impact DHS
- CISA Kicks Off Cybersecurity Awareness Month With New Program
- Silverfort Open Sources Lateral Movement Detection Tool
- Generative AI Startup Nexusflow Raises $10.6 Million
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
- Cloudflare Users Exposed to Attacks Launched From Within Cloudflare: Researchers
Latest News
- Live Exploitation Underscores Urgency to Patch Critical WS-FTP Server Flaw
- European Telecommunications Standards Institute Discloses Data Breach
- Number of Internet-Exposed ICS Drops Below 100,000: Report
- Johnson Controls Ransomware Attack Could Impact DHS
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
- CISA Kicks Off Cybersecurity Awareness Month With New Program
- Recently Patched TeamCity Vulnerability Exploited to Hack Servers
- Silverfort Open Sources Lateral Movement Detection Tool
