Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 1 | # Severity Guidelines for Security Issues |
| 2 | |
| 3 | [TOC] |
| 4 | |
| 5 | Vendors shipping products based on Chromium might wish to rate the severity of |
| 6 | security issues in the products they release. This document contains guidelines |
| 7 | for how to rate these issues. Check out our |
| 8 | [security release management page](https://www.chromium.org/Home/chromium-security/security-release-management) |
| 9 | for guidance on how to release fixes based on severity. |
| 10 | |
Amy Ressler | 4e00f88 | 2022-02-24 18:03:41 | [diff] [blame] | 11 | Any significant mitigating factors will generally reduce an issue's severity by one or |
| 12 | more levels: |
| 13 | * Not web accessible, reliant solely on direct UI interaction to trigger. |
| 14 | * Unusual or unlikely user interaction will normally reduce severity by one |
| 15 | level. This means interaction which may sometimes occur, but would not be |
| 16 | typical of an average user engaging with Chrome or a particular feature in |
| 17 | Chrome, nor could a user be easily convinced to perform by a persuasive web page. |
| 18 | * Requiring profile destruction or browser shutdown will normally reduce |
| 19 | severity by one level. |
Adrian Taylor | 850e6c0 | 2023-05-15 09:56:25 | [diff] [blame^] | 20 | * [MiraclePtr protection](#TOC-MiraclePtr) |
Amy Ressler | 4e00f88 | 2022-02-24 18:03:41 | [diff] [blame] | 21 | |
| 22 | Bugs that require implausible interaction, interactions a user would not |
| 23 | realistically be convinced to perform, will generally be downgraded to a |
| 24 | functional bug and not considered a security bug. |
Adrian Taylor | 44dbdc8 | 2020-01-07 01:49:19 | [diff] [blame] | 25 | |
| 26 | Conversely, we do not consider it a mitigating factor if a vulnerability applies |
| 27 | only to a particular group of users. For instance, a Critical vulnerability is |
| 28 | still considered Critical even if it applies only to Linux or to those users |
| 29 | running with accessibility features enabled. |
| 30 | |
| 31 | Also note that most crashes do not indicate vulnerabilities. Chromium is designed |
| 32 | to crash in a controlled manner (e.g., with a ```__debugBreak```) when memory is |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 33 | exhausted or in other exceptional circumstances. |
| 34 | |
| 35 | |
Chris Palmer | 3230111 | 2019-02-06 00:02:56 | [diff] [blame] | 36 | ## Critical severity {#TOC-Critical-severity} |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 37 | |
Chris Palmer | 5c33077 | 2019-05-24 23:32:43 | [diff] [blame] | 38 | Critical severity issues allow an attacker to read or write arbitrary resources |
| 39 | (including but not limited to the file system, registry, network, et c.) on the |
| 40 | underlying platform, with the user's full privileges. |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 41 | |
| 42 | They are normally assigned priority **Pri-0** and assigned to the current stable |
| 43 | milestone (or earliest milestone affected). For critical severity bugs, |
| 44 | [SheriffBot](https://www.chromium.org/issue-tracking/autotriage) will |
| 45 | automatically assign the milestone. |
| 46 | |
Chris Palmer | 91bab48 | 2019-07-17 00:05:36 | [diff] [blame] | 47 | **For critical severity vulnerabilities, we aim to deploy the patch to all |
| 48 | Chrome users in under 30 days.** |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 49 | |
| 50 | Critical vulnerability details may be made public in 60 days, |
| 51 | in accordance with Google's general [vulnerability disclosure recommendations](https://security.googleblog.com/2010/07/rebooting-responsible-disclosure-focus.html), |
| 52 | or [faster (7 days)](https://security.googleblog.com/2013/05/disclosure-timeline-for-vulnerabilities.html) |
| 53 | if there is evidence of active exploitation. |
| 54 | |
| 55 | Example bugs: |
| 56 | |
Daniel Cheng | 62a44a8 | 2019-09-09 22:15:36 | [diff] [blame] | 57 | * Memory corruption in the browser process ([319125](https://crbug.com/319125#c10)). |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 58 | * Exploit chains made up of multiple bugs that can lead to code execution |
Chris Palmer | 5c33077 | 2019-05-24 23:32:43 | [diff] [blame] | 59 | outside of the sandbox ([416449](https://crbug.com/416449)). |
| 60 | * A bug that enables web content to read local files |
| 61 | ([962500](https://crbug.com/962500)). |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 62 | |
| 63 | Note that the individual bugs that make up the chain will have lower severity |
| 64 | ratings. |
| 65 | |
| 66 | |
Chris Palmer | 3230111 | 2019-02-06 00:02:56 | [diff] [blame] | 67 | ## High severity {#TOC-High-severity} |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 68 | |
| 69 | High severity vulnerabilities allow an attacker to execute code in the context |
Lukasz Anforowicz | cb7b514 | 2019-07-19 23:40:16 | [diff] [blame] | 70 | of, or otherwise impersonate other origins or read cross-origin data. |
| 71 | Bugs which would normally be |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 72 | critical severity with unusual mitigating factors may be rated as high severity. |
| 73 | For example, renderer sandbox escapes fall into this category as their impact is |
| 74 | that of a critical severity bug, but they require the precondition of a |
Adrian Taylor | 6f37ff3 | 2020-05-01 00:40:14 | [diff] [blame] | 75 | compromised renderer. (Bugs which involve using [MojoJS](../../mojo/public/js/README.md) |
| 76 | to trigger an exploitable browser process crash usually fall into this category). |
Amy Ressler | 4e00f88 | 2022-02-24 18:03:41 | [diff] [blame] | 77 | Another example are bugs that result in memory corruption in the browser |
| 78 | process, which would normally be critical severity, but require browser shutdown |
| 79 | or profile destruction, which would lower these issues to high severity. A |
| 80 | bug with the precondition of browser shutdown or profile destruction should be |
| 81 | considered to have a maximum severity of high and could potentially be |
| 82 | reduced by other mitigating factors. |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 83 | |
| 84 | They are normally assigned priority **Pri-1** and assigned to the current stable |
| 85 | milestone (or earliest milestone affected). For high severity bugs, |
| 86 | [SheriffBot](https://www.chromium.org/issue-tracking/autotriage) will |
| 87 | automatically assign the milestone. |
| 88 | |
Chris Palmer | 91bab48 | 2019-07-17 00:05:36 | [diff] [blame] | 89 | **For high severity vulnerabilities, we aim to deploy the patch to all Chrome |
| 90 | users in under 60 days.** |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 91 | |
| 92 | Example bugs: |
| 93 | |
| 94 | * A bug that allows full circumvention of the same origin policy. Universal XSS |
| 95 | bugs fall into this category, as they allow script execution in the context of |
| 96 | an arbitrary origin ([534923](https://crbug.com/534923)). |
| 97 | * A bug that allows arbitrary code execution within the confines of the sandbox, |
Amy Ressler | 4e00f88 | 2022-02-24 18:03:41 | [diff] [blame] | 98 | such as renderer, network, or GPU process memory corruption |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 99 | ([570427](https://crbug.com/570427), [468936](https://crbug.com/468936)). |
| 100 | * Complete control over the apparent origin in the omnibox |
| 101 | ([76666](https://crbug.com/76666)). |
| 102 | * Memory corruption in the browser process that can only be triggered from a |
| 103 | compromised renderer, leading to a sandbox escape |
| 104 | ([469152](https://crbug.com/469152)). |
| 105 | * Kernel memory corruption that could be used as a sandbox escape from a |
| 106 | compromised renderer ([377392](https://crbug.com/377392)). |
| 107 | * Memory corruption in the browser process that requires specific user |
| 108 | interaction, such as granting a permission ([455735](https://crbug.com/455735)). |
Lukasz Anforowicz | 33b1435 | 2019-09-20 21:57:58 | [diff] [blame] | 109 | * Site Isolation bypasses: |
| 110 | - Cross-site execution contexts unexpectedly sharing a renderer process |
| 111 | ([863069](https://crbug.com/863069), [886976](https://crbug.com/886976)). |
| 112 | - Cross-site data disclosure |
| 113 | ([917668](https://crbug.com/917668), [927849](https://crbug.com/927849)). |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 114 | |
| 115 | |
Chris Palmer | 3230111 | 2019-02-06 00:02:56 | [diff] [blame] | 116 | ## Medium severity {#TOC-Medium-severity} |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 117 | |
| 118 | Medium severity bugs allow attackers to read or modify limited amounts of |
| 119 | information, or are not harmful on their own but potentially harmful when |
| 120 | combined with other bugs. This includes information leaks that could be useful |
| 121 | in potential memory corruption exploits, or exposure of sensitive user |
Chris Palmer | 91bab48 | 2019-07-17 00:05:36 | [diff] [blame] | 122 | information that an attacker can exfiltrate. Bugs that would normally be rated |
| 123 | at a higher severity level with unusual mitigating factors may be rated as |
| 124 | medium severity. |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 125 | |
| 126 | They are normally assigned priority **Pri-1** and assigned to the current stable |
| 127 | milestone (or earliest milestone affected). If the fix seems too complicated to |
| 128 | merge to the current stable milestone, they may be assigned to the next stable |
| 129 | milestone. |
| 130 | |
| 131 | Example bugs: |
| 132 | |
| 133 | * An out-of-bounds read in a renderer process |
| 134 | ([281480](https://crbug.com/281480)). |
| 135 | * An uninitialized memory read in the browser process where the values are |
| 136 | passed to a compromised renderer via IPC ([469151](https://crbug.com/469151)). |
| 137 | * Memory corruption that requires a specific extension to be installed |
| 138 | ([313743](https://crbug.com/313743)). |
Amy Ressler | 4e00f88 | 2022-02-24 18:03:41 | [diff] [blame] | 139 | * Memory corruption in the browser process, triggered by a browser shutdown that |
| 140 | is not reliably triggered and/or is difficult to trigger ([1230513](https://crbug.com/1230513)). |
| 141 | * Memory corruption in the browser process, requiring a non-standard flag and |
| 142 | user interaction ([1255332](https://crbug.com/1255332)). |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 143 | * An HSTS bypass ([461481](https://crbug.com/461481)). |
| 144 | * A bypass of the same origin policy for pages that meet several preconditions |
| 145 | ([419383](https://crbug.com/419383)). |
| 146 | * A bug that allows web content to tamper with trusted browser UI |
| 147 | ([550047](https://crbug.com/550047)). |
| 148 | * A bug that reduces the effectiveness of the sandbox |
| 149 | ([338538](https://crbug.com/338538)). |
| 150 | * A bug that allows arbitrary pages to bypass security interstitials |
| 151 | ([540949](https://crbug.com/540949)). |
| 152 | * A bug that allows an attacker to reliably read or infer browsing history |
| 153 | ([381808](https://crbug.com/381808)). |
| 154 | * An address bar spoof where only certain URLs can be displayed, or with other |
| 155 | mitigating factors ([265221](https://crbug.com/265221)). |
| 156 | * Memory corruption in a renderer process that requires specific user |
| 157 | interaction, such as dragging an object ([303772](https://crbug.com/303772)). |
| 158 | |
| 159 | |
Chris Palmer | 3230111 | 2019-02-06 00:02:56 | [diff] [blame] | 160 | ## Low severity {#TOC-Low-severity} |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 161 | |
| 162 | Low severity vulnerabilities are usually bugs that would normally be a higher |
| 163 | severity, but which have extreme mitigating factors or highly limited scope. |
| 164 | |
| 165 | They are normally assigned priority **Pri-2**. Milestones can be assigned to low |
| 166 | severity bugs on a case-by-case basis, but they are not normally merged to |
| 167 | stable or beta branches. |
| 168 | |
| 169 | Example bugs: |
| 170 | |
| 171 | * Bypass requirement for a user gesture ([256057](https://crbug.com/256057)). |
| 172 | * Partial CSP bypass ([534570](https://crbug.com/534570)). |
| 173 | * A limited extension permission bypass ([169632](https://crbug.com/169632)). |
| 174 | * An uncontrolled single-byte out-of-bounds read |
| 175 | ([128163](https://crbug.com/128163)). |
| 176 | |
Adrian Taylor | b3f7312 | 2020-04-30 00:56:14 | [diff] [blame] | 177 | |
Adrian Taylor | 364e9fd | 2020-11-04 22:41:11 | [diff] [blame] | 178 | ## Can't impact Chrome users by default {#TOC-No-impact} |
| 179 | |
| 180 | If the bug can't impact Chrome users by default, this is denoted instead by |
| 181 | the **Security-Impact_None** label. See |
| 182 | [the security labels document](security-labels.md#TOC-Security_Impact-None) |
| 183 | for more information. The bug should still have a severity set according |
| 184 | to these guidelines. |
| 185 | |
| 186 | |
Adrian Taylor | b3f7312 | 2020-04-30 00:56:14 | [diff] [blame] | 187 | ## Not a security bug {#TOC-Not-a-security-bug} |
| 188 | |
Varun Khaneja | df1bc00e | 2017-08-10 05:22:40 | [diff] [blame] | 189 | The [security FAQ](faq.md) covers many of the cases that we do not consider to |
Adrian Taylor | b3f7312 | 2020-04-30 00:56:14 | [diff] [blame] | 190 | be security bugs, such as [denial of service](faq.md#TOC-Are-denial-of-service-issues-considered-security-bugs-) |
| 191 | and, in particular, null pointer dereferences with consistent fixed offsets. |
Adrian Taylor | b1691a8 | 2022-08-23 18:54:37 | [diff] [blame] | 192 | |
| 193 | |
Adrian Taylor | 850e6c0 | 2023-05-15 09:56:25 | [diff] [blame^] | 194 | ## "MiraclePtr" protection against use-after-free {#TOC-MiraclePtr} |
Adrian Taylor | b1691a8 | 2022-08-23 18:54:37 | [diff] [blame] | 195 | |
| 196 | ["MiraclePtr"](../../base/memory/raw_ptr.md) is a technology designed to |
| 197 | deterministically prevent exploitation of use-after-free bugs. Address |
| 198 | sanitizer is aware of MiraclePtr and will report on whether a given |
| 199 | use-after-free bug is protected or not: |
| 200 | |
| 201 | ``` |
| 202 | MiraclePtr Status: NOT PROTECTED |
| 203 | No raw_ptr<T> access to this region was detected prior to the crash. |
| 204 | ``` |
| 205 | |
| 206 | or |
| 207 | |
| 208 | ``` |
| 209 | MiraclePtr Status: PROTECTED |
| 210 | The crash occurred while a raw_ptr<T> object containing a dangling pointer was being dereferenced. |
| 211 | MiraclePtr should make this crash non-exploitable in regular builds. |
| 212 | ``` |
| 213 | |
Adrian Taylor | 850e6c0 | 2023-05-15 09:56:25 | [diff] [blame^] | 214 | MiraclePtr is now active on all relevant Chromium platforms since main position |
| 215 | [1136369](https://chromium-review.googlesource.com/c/chromium/src/+/4478673), |
| 216 | which will be present in Chrome 115. |
| 217 | |
| 218 | If a bug impacts only M115 or later and is marked `MiraclePtr Status: |
| 219 | PROTECTED`, it should be downgraded by one severity level. (For example, a bug |
| 220 | that would previously be High severity would now be only Medium severity). |
| 221 | Once M115 has reached Extended Stable, we will apply this rule to all such |
| 222 | `MiraclePtr Status: PROTECTED` bugs. |
| 223 | |
| 224 | Once we have more practical experience across all platforms, we may reclassify |
| 225 | them as non-security bugs. |