Virtual Event: Threat Detection & Incident Response Summit - Watch Now
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Chrome 126 Update Patches Memory Safety Bugs

Google has released a Chrome security update to resolve four high-severity use-after-free vulnerabilities.

Chrome security

Google on Monday announced a new Chrome security update that addresses four high-severity memory safety vulnerabilities reported by external researchers.

The four issues, tracked as CVE-2024-6290 to CVE-2024-6293, are use-after-free bugs impacting the Dawn and Swiftshader components of the popular browser.

Three of the security defects, all impacting Dawn, were reported by security researcher ‘wgslfuzz’ over the past month, while the fourth was reported by Cassidy Kim in November 2023.

Google handed out a $10,000 bug bounty reward to wgslfuzz for CVE-2024-6290 and a $4,000 one to Kim for CVE-2024-6291, but has yet to determine the amounts to be paid for the other two vulnerabilities.

The latest Chrome iteration is now rolling out to users as version 126.0.6478.126 for Linux and as versions 126.0.6478.126/127 for Windows and macOS. Chrome for Android was also updated with fixes for these flaws and is now available as version 126.0.6478.122.

While Google makes no mention of any of these vulnerabilities being exploited in the wild, users are advised to update their browsers as soon as possible.

Advertisement. Scroll to continue reading.

Use-after-free issues are related to the incorrect use of dynamic memory during an application’s operations and occur when, after memory allocation is freed, the pointer to that memory is not cleared.

An attacker could exploit the error to execute arbitrary code, corrupt data, or cause denial-of-service conditions. When combined with other vulnerabilities, use-after-free bugs could lead to complete system compromise.

In Chrome, use-after-free issues can be exploited to escape the browser’s sandbox, if the attacker can target a vulnerability in the underlying operating system or in a privileged Chrome process.

For several years, Google has been battling an increasing number of memory safety flaws in Chrome, including with improved protections against use-after-free bug exploitation, and by gradually transitioning to Rust, a memory safe programming language.

Related: Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition

Related: Chrome 126, Firefox 127 Patch High-Severity Vulnerabilities

Related: Microsoft Temporarily Disables SketchUp Support After Discovery of 117 Vulnerabilities

Related: Critical Vulnerabilities Impact Widely Used Printed Circuit Board File Viewer

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing for the latest cybersecurity threats, trends, and expert insights.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

People on the Move

Joe Chen has become Chief Technology Officer at Trellix.

Usercentrics has named Pawan Hegde as COO and Elena Ignatova as CPTO.

SecureAuth has named Mark van Oppen as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.