Google fixes nine bugs in Chrome, including sandbox-escape flaw

Adds 'instant' search and WebGL support, plugs holes five weeks before Pwn2Own hacking contest

By , Computerworld |  Security, Chrome, vulnerabilities

Google on Thursday patched nine bugs in Chrome and upgraded the most stable edition of the browser to version 9.

Chrome 9 also added support for WebGL, an API (application programming interface) that hardware accelerates 3-D graphics without relying on a plug-in; debuted Google Instant , which starts showing search results as soon as a user begins typing; and wrapped up work on the Chrome Web Store , Google's online market for browser applications.

The nine flaws fixed in Chrome 9.0.597.84 range from several crash bugs to what Google called a "race condition in audio handling."

The latter was the only vulnerability rated as "critical," Google's most serious ranking. Two others were pegged as "high" and six were labeled as "low."

According to French security company Vupen, the audio handling race condition bug can be exploited to escape Chrome's sandbox .

If accurate, it would be the second sandbox-escape vulnerability that Google's patched in the last two months. On Jan. 12, Google updated Chrome with fixes for 16 bugs, including one that Adobe yesterday said was also a sandbox-escape flaw.

Adobe mentioned the Chrome sandbox bug when answering Computerworld questions about Reader X , the version of Adobe's popular PDF viewer that also relies on a sandbox to protect users. Reader X's sandbox is partially based on Chrome's technology.

Google did not respond to questions about the two Chrome sandbox vulnerabilities.

Chrome is the only major browser that isolates system processes in a sandbox, technology designed to prevent malware from escaping an application -- like Chrome -- to infect the computer or steal information from the hard drive.

The sandbox bug patching couldn't come at a better time for Chrome, which will face off against researchers next month at the fifth annual Pwn2Own hacking contest in Vancouver, British Columbia.

The first researcher to successfully exploit Chrome and its sandbox will receive a $20,000 cash prize, with all or part of that coming out of Google's pockets.


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness