The Stable channel has been updated to 33.0.1750.152 (Platform version: 5116.115.4/5116.115.5) for all devices. This build contains security fixes for Pwnium. Systems will be receiving the updates over the next few days.

Security Fixes and Rewards

Congratulations to geohot for an epic Pwnium competition win. Pinkie Pie provided a fascinating set of vulnerabilities that will be rewarded through the Chrome VRP program. Moreover, one of the bugs exploited by VUPEN on Pwn2Own affected Chrome OS.

We’re delighted at the success of Pwnium and the ability to study full exploits. We anticipate landing additional changes and hardening measures for these vulnerabilities in the near future. We also believe that both Pwnium submissions are works of art and deserve wider sharing and recognition. We plan to do technical reports on these submissions in the future.
  • [Like a c-c-c-c-hamp!!! $150,000] [351788] Persistent code execution on Chrome OS. Credit to geohot.
    • [351787] High CVE-2014-1705: Memory corruption in V8
    • [351796] Low CVE-2014-1706: Command Injection in Crosh
    • [351811] High CVE-2014-1707: Path traversal issue in CrosDisks
    • [344051] Critical CVE-2014-1708: Issue with file persistence at boot
  • [$TBD] [352492] Sandboxed code execution and kernel OOB write. Credit to Pinkie Pie.
    • [351852] High CVE-2014-1710: Memory corruption in GPU command buffer
    • [351855] High CVE-2014-1711: Kernel OOB write in GPU driver
  • [352374] High CVE-2014-1713: Use-after-free in Blink bindings. Credit to VUPEN.

Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.

If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).

Dharani Govindan
Google Chrome