Date: 26 August 2010
References: ESB-2010.1061 ESB-2010.1066 ESB-2011.0083
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
Google have released an update for Chrome
26 August 2010
AusCERT Security Bulletin Summary
Product: Google Chrome
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Denial of Service -- Remote with User Interaction
Provide Misleading Information -- Remote with User Interaction
Reduced Security -- Remote with User Interaction
CVE Names: CVE-2010-3111 CVE-2010-3112 CVE-2010-3113
CVE-2010-3114 CVE-2010-3115 CVE-2010-3116
CVE-2010-3117 CVE-2010-3118 CVE-2010-3119
Member content until: Wednesday, September 22 2010
Revision History: August 26 2010: Added CVE References
August 23 2010: Initial Release
Google have released an update for Chrome, correcting several security
The vendor has provided the following information regarding these
Aside from the listed security bugs fixed in Chromium, we have also
deployed a workaround for a critical vulnerability where the root
cause lies in an external component. Credit and $1337 to Marc
Schoenefeld for enabling us to work around another Windows kernel
* [$1337]  Critical Memory corruption with file dialog.
Credit to Sergey Glazunov.
* [$500]  High Memory corruption with SVGs. Credit to wushi
* [$500]  High Bad cast with text editing. Credit to wushi
* [$1000]  High Possible address bar spoofing with history
bug. Credit to Mike Taylor.
* [$2000]   High Memory corruption in MIME type
handling. Credit to Sergey Glazunov.
* [$1337]  Critical Crash on shutdown due to notifications
bug. Credit to Sergey Glazunov.
*  Medium Stop omnibox autosuggest if the user might be
about to type a password. Credit to Robert Hansen.
* [$1000]  High Memory corruption with Ruby support. Credit
* [$1000]  High Memory corruption with Geolocation support.
Credit to kuzzcc.
The latest version of Google Chrome (currently 5.0.375.127) can be
downloaded from the vendor's website. 
The update can also be applied from within Google Chrome using
the built in update feature.
 Stable Channel Update
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----