Google Releases Urgent Chrome Update to Patch 2 Actively Exploited 0-Day Bugs

02 November 2021 | 09:01 Code : 21423 news
visits:323
News Author: Naser Rezaii
Google Releases Urgent Chrome Update to Patch 2 Actively Exploited 0-Day Bugs

Google Releases Urgent Chrome Update to Patch 2 Actively Exploited 0-Day Bugs
Google on Thursday rolled out an emergency update for its Chrome web browser, including fixes for two zero-day vulnerabilities that it says are being actively exploited in the wild.
Tracked as CVE-2021-38000 and CVE-2021-38003, the weaknesses relate to insufficient validation of untrusted input in a feature called Intents as well as a case of inappropriate implementation in V8 JavaScript and WebAssembly engine. The internet giant's Threat Analysis Group (TAG) has been credited with discovering and reporting the two flaws on September 15, 2021, and October 26, 2021, respectively.
"Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003 exist in the wild," the company noted in an advisory without delving into technical specifics about how the two vulnerabilities were used in attacks or the threat actors that may have weaponized them.
Also addressed as part of this stable channel update is a use-after-free vulnerability in the Web Transport component (CVE-2021-38002), which was demonstrated for the first time at the Tianfu Cup contest held earlier this month in China. With these patches, Google has resolved a record 16 zero-days in the web browser since the start of the year —
•    CVE-2021-21148 - Heap buffer overflow in V8
•    CVE-2021-21166 - Object recycle issue in audio
•    CVE-2021-21193 - Use-after-free in Blink
•    CVE-2021-21206 - Use-after-free in Blink
•    CVE-2021-21220 - Insufficient validation of untrusted input in V8 for x86_64
•    CVE-2021-21224 - Type confusion in V8
•    CVE-2021-30551 - Type confusion in V8
•    CVE-2021-30554 - Use-after-free in WebGL
•    CVE-2021-30563 - Type confusion in V8
•    CVE-2021-30632 - Out of bounds write in V8
•    CVE-2021-30633 - Use-after-free in Indexed DB API
•    CVE-2021-37973 - Use-after-free in Portals
•    CVE-2021-37975 - Use-after-free in V8
•    CVE-2021-37976 - Information leak in core
Chrome users are advised to update to the latest version (95.0.4638.69) for Windows, Mac, and Linux by heading to Settings > Help > 'About Google Chrome' to mitigate any potential risk of active exploitation.

Reference: thehackernews.com
 

Naser Rezaii

News Author

tags: cve 2021 bull cve 2021 v8 bull cve 2021 cve bull cve v8 bull cve confusion v8 bull cve bull v8 bull confusion v8 bull


Your Comment :