Stable Channel Update for Chrome OS
Friday, March 14, 2014
The Stable channel has been updated to 33.0.1750.152 (Platform version: 5116.115.4/5116.115.5) for all devices. This build contains security fixes for Pwnium. Systems will be receiving the updates over the next few days.
Security Fixes and Rewards
Congratulations to geohot for an epic Pwnium competition win. Pinkie Pie provided a fascinating set of vulnerabilities that will be rewarded through the Chrome VRP program. Moreover, one of the bugs exploited by VUPEN on Pwn2Own affected Chrome OS.
We’re delighted at the success of Pwnium and the ability to study full exploits. We anticipate landing additional changes and hardening measures for these vulnerabilities in the near future. We also believe that both Pwnium submissions are works of art and deserve wider sharing and recognition. We plan to do technical reports on these submissions in the future.
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).
Dharani Govindan
Google Chrome
Security Fixes and Rewards
Congratulations to geohot for an epic Pwnium competition win. Pinkie Pie provided a fascinating set of vulnerabilities that will be rewarded through the Chrome VRP program. Moreover, one of the bugs exploited by VUPEN on Pwn2Own affected Chrome OS.
We’re delighted at the success of Pwnium and the ability to study full exploits. We anticipate landing additional changes and hardening measures for these vulnerabilities in the near future. We also believe that both Pwnium submissions are works of art and deserve wider sharing and recognition. We plan to do technical reports on these submissions in the future.
- [Like a c-c-c-c-hamp!!! $150,000] [351788] Persistent code execution on Chrome OS. Credit to geohot.
- [$TBD] [352492] Sandboxed code execution and kernel OOB write. Credit to Pinkie Pie.
- [352374] High CVE-2014-1713: Use-after-free in Blink bindings. Credit to VUPEN.
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).
Dharani Govindan
Google Chrome