Google this week launched Chrome 71 to the secure channel with 43 security fixes inside, in addition to with a collection of further protections to improve the overall consumer expertise.
The new browser release utterly eliminates inline installation of extensions by stripping Chrome off the inline install API technique. Google set off on the path to take away the inline installation from its browser in June, when it prevented newly revealed extensions from accessing the option.
Chrome 71 also notifies customers of unclear subscription pages, but only when it detects that the accessed page does not provide adequate billing info. The warning can be displayed to both desktop and cellular users, and Google may even contact the affected webmasters to deal with the difficulty.
To further enhance the consumer experience, Google has added protections from web sites that employ abusing ad experiences, which are often utilized by scammers and phishers to steal consumer info. Chrome 71 will remove all advertisements on sites with persistent abusive experiences.
The brand new software release additionally patches tens of safety vulnerabilities, including 34 points that have been reported by external researchers. Of those, 13 have been rated Excessive severity, 15 have been Medium danger bugs, and 6 have been thought-about Low severity.
A few of the most essential safety bugs addressed in Chrome 71 embrace use after free points in PDFium, Blink, WebAudio, and MediaRecorder; out of bounds writes in V8; heap buffer overflows in Skia, Canvas, and Blink; inappropriate implementation in Extensions, and numerous issues in SQLite by way of WebSQL.
The resolved Medium danger bugs embrace inappropriate implementations in Website Isolation, Navigation, Omnibox, Media, and Network Authentication; insufficient policy enforcement in Blink, Navigation, URL Formatter, and Proxy; incorrect safety UI in Blink; insufficient knowledge validation in Shell Integration; use after free in Skia; and out of bounds read in V8.
The Low severity issues included inappropriate implementation in PDFium and Navigation; use after free in Extensions; and inadequate policy enforcement in Navigation and URL Formatter.
In its advisory, Google revealed it paid almost $60000 in bug bounties to the security researchers who reported these bugs. Rated Medium, the inappropriate implementation in Website Isolation (CVE-2018-18345) was awarded the very best bug bounty, at $8000.Infosec Island