Chrome 80 Released With 56 Security Fixes
Google this week released Chrome 80 to the stable channel with 56 vulnerability patches and various other improvements to user security.
To better protect from cross-site request forgery (CSRF) attacks, Chrome 80 will enforce a new secure-by-default cookie classification system, where only cookies set as SameSite=None; Secure will be available in third-party contexts, as long as they are accessed from secure connections.
The change, initially announced in May 2019, is set to enter into effect later this month, when Chrome will treat cookies that have no declared SameSite value as SameSite=Lax cookies. The changes will initially be seen by only a small set of users.
The new browser release also deprecates FTP support, since the implementation does not support secure connections or proxies, and because usage is low. Google plans to disable FTP by default in the next Chrome iteration and will completely remove support for it in Chrome 82.
As Google announced in October last year, Chrome 81 will autoupdate mixed images to HTTPS, or will block them if they fail to load over a secure connection.
Google has been advocating for the adoption of HTTPS for a long time, and the autoupdating of mixed content is only one of the steps it’s taking to get website owners to transition to encrypted connections.
Of the 56 patches included in the new release — which is rolling out to Windows, Mac and Linux as Chrome 80.0.3987.87 — 37 address vulnerabilities that were reported by external researchers. These include 10 flaws rated high severity, 17 considered medium risk, and 10 low severity bugs.
Google paid a total of $48,000 in bug bounty rewards to the reporting researchers, but it has yet to reveal the amounts awarded for some of the addressed vulnerabilities.