Google this week announced a Chrome update that resolves eight vulnerabilities in the popular browser, including five reported by external researchers.
Google this week announced a Chrome update that resolves eight vulnerabilities in the popular browser, including five reported by external researchers.
All five security defects are use-after-free flaws, a type of memory safety bug that has been prevalent in Chrome over the past years, and which Google has long-battled to eliminate.
According to Google’s advisory, four of these issues are high-severity bugs, impacting components such as Blink Media, Mojo IPC, Blink Frames, and Aura.
The vulnerabilities have been issued CVE identifiers CVE-2022-4436 to CVE-2022-4439 and are accompanied by CVE-2022-4440, a medium-severity use-after-free.
Google says it has paid $17,500 in bug bounties to the reporting researchers, but the final amount might be higher, as only four out of five rewards have been disclosed.
The latest Chrome browser release is currently rolling out to Mac and Linux users as version 108.0.5359.124, and to Windows users as version 108.0.5359.124/.125.
Google makes no mention of any of these vulnerabilities being exploited in malicious attacks. To date, there have been nine documented Chrome zero-day flaws in 2022.
An attacker in a position to exploit a use-after-free vulnerability may be able to crash the application, corrupt data, or execute arbitrary code on the machine. In Chrome, use-after-free flaws may be used to escape the browser sandbox, which requires the exploitation of additional security defects.
Over the past couple of years, Google announced several efforts to eliminate memory safety bugs in both Android and Chrome, and recently announced improved protections against the exploitation of such vulnerabilities.
By Ionut Arghire on Wed, 14 Dec 2022 14:02:20 +0000
Original link