Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Chrome 111 Update Patches High-Severity Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.

Google this week announced a Chrome 111 update that brings patches for eight vulnerabilities, including seven flaws that were reported by external researchers.

All seven of the externally reported issues are high-severity memory safety bugs, with four of them described as use-after-free vulnerabilities, a type of bug that could lead to arbitrary code execution, data corruption, or denial of service.

Based on the bug bounty reward handed out ($10,000), the most important of these vulnerabilities is CVE-2023-1528, a use-after-free flaw in Chrome’s Passwords component.

“It hides the password leak detection dialog before displaying the account selector, which means that the password leak detection dialog shouldn’t be opened before you have selected your Google account. An attacker can gain access to the vulnerable password,” Action1 VP Mike Walters told SecurityWeek in an emailed comment.

Next in line is CVE-2023-1529, an out-of-bounds memory access in WebHID, for which Google paid an $8,000 bug bounty.

“The vulnerability can handle empty input reports. It’s possible for a HID device to define its report descriptor so that one or more reports have no data fields within the report. When these reports are received, the report buffer should contain only the report ID byte and no other data. This can be used to define which reports have some data and to filter out reports without data,” Walters said.

Advertisement. Scroll to continue reading.

Three other use-after-free issues were addressed in PDF, in the ANGLE graphics engine, and in WebProtect. The internet giant says it paid out a $7,000 bounty for the PDF flaw, but has yet to determine the amounts to be paid for the other two bugs.

The latest Chrome 111 update also brings patches for two out-of-bounds read issues in GPU Video and ANGLE. Per Google’s policy, no bug bounty reward will be issued for these flaws, as they were reported by Google Project Zero security researchers.

The internet giant made no mention of any of these vulnerabilities being exploited in attacks.

The latest Chrome release is now rolling out as version 111.0.5563.110 for Mac and Linux and as versions 111.0.5563.110/.111 for Windows.

Related: Google Discontinuing Chrome Tool for Removing Unwanted Software

Related: Chrome 111 Patches 40 Vulnerabilities

Related: Chrome 110 Patches 15 Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Malwarebytes has named Chung Ip as Chief Financial Officer.

Semperis has appointed John Podboy as Chief Information Security Officer.

Randy Menon has become Chief Product and Marketing Officer at One Identity.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.