Google addresses four high-severity flaws in Chrome

Google has addressed a total of four high-severity vulnerabilities in the Chrome version for Windows, Mac, and Linux.

Google released security updates to address a total of four high-severity vulnerabilities in the Chrome version for Windows, Mac, and Linux.

The most severe vulnerability, tracked as CVE-2021-37977, is an after-free issue in Garbage Collection that could lead to arbitrary code execution. The flaw was reported by an anonymous researcher and Google awarded him with a $10,000 bounty payout.

Google also addressed two heap buffer overflow vulnerabilities in Blink and WebRTC tracked as CVE-2021-37978 and CVE-2021-37979 respectively.

The CVE-2021-37978 vulnerability was reported by Yangkang (@dnpushme) of 360 ATA, while CVE-2021-37979 was reported by Marcin Towalski of Cisco Talos. Google paid a $10,000 bounty reward for both vulnerabilities.

A fourth high-severity issue fixed by Google is an inappropriate implementation in Sandbox, tracked as CVE-2021-37980, that was reported by Yonghwi Jin (@jinmo123). The researchers received a $3,000 bounty reward for the finding.

“The Stable channel has been updated to 94.0.4606.81 for Windows, Mac and Linux which will roll out over the coming days/weeks. Extended stable channel has also been updated to 94.0.4606.81 for Windows and Mac which will roll out over the coming days/weeks” reads Google Stable Channel Update for Desktop.

Now rolling out to desktop users as Chrome version 94.0.4606.81, the new browser iteration also addresses two heap buffer overflow vulnerabilities in Blink (CVE-2021-37978) and WebRTC (CVE-2021-37979).

Google did not reveal if any of the flaws addressed in the last turn have been exploited in attacks in the wild.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, Chrome)

The post Google addresses four high-severity flaws in Chrome appeared first on Security Affairs.

If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.

Discord

Original Source