Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Chrome 126 Update Patches Memory Safety Bugs

Google has released a Chrome security update to resolve four high-severity use-after-free vulnerabilities.

Chrome vulnerabilities

Google on Monday announced a new Chrome security update that addresses four high-severity memory safety vulnerabilities reported by external researchers.

The four issues, tracked as CVE-2024-6290 to CVE-2024-6293, are use-after-free bugs impacting the Dawn and Swiftshader components of the popular browser.

Three of the security defects, all impacting Dawn, were reported by security researcher ‘wgslfuzz’ over the past month, while the fourth was reported by Cassidy Kim in November 2023.

Google handed out a $10,000 bug bounty reward to wgslfuzz for CVE-2024-6290 and a $4,000 one to Kim for CVE-2024-6291, but has yet to determine the amounts to be paid for the other two vulnerabilities.

The latest Chrome iteration is now rolling out to users as version 126.0.6478.126 for Linux and as versions 126.0.6478.126/127 for Windows and macOS. Chrome for Android was also updated with fixes for these flaws and is now available as version 126.0.6478.122.

While Google makes no mention of any of these vulnerabilities being exploited in the wild, users are advised to update their browsers as soon as possible.

Use-after-free issues are related to the incorrect use of dynamic memory during an application’s operations and occur when, after memory allocation is freed, the pointer to that memory is not cleared.

An attacker could exploit the error to execute arbitrary code, corrupt data, or cause denial-of-service conditions. When combined with other vulnerabilities, use-after-free bugs could lead to complete system compromise.

Advertisement. Scroll to continue reading.

In Chrome, use-after-free issues can be exploited to escape the browser’s sandbox, if the attacker can target a vulnerability in the underlying operating system or in a privileged Chrome process.

For several years, Google has been battling an increasing number of memory safety flaws in Chrome, including with improved protections against use-after-free bug exploitation, and by gradually transitioning to Rust, a memory safe programming language.

Related: Chrome 126 Update Patches Vulnerability Exploited at Hacking Competition

Related: Chrome 126, Firefox 127 Patch High-Severity Vulnerabilities

Related: Microsoft Temporarily Disables SketchUp Support After Discovery of 117 Vulnerabilities

Related: Critical Vulnerabilities Impact Widely Used Printed Circuit Board File Viewer

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Learn how to utilize tools, controls, and design models needed to properly secure cloud environments.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

SaaS security company AppOmni has hired Joel Wallenstrom as its General Manager.

FTI Consulting has appointed Brett Callow as Managing Director in its Cybersecurity & Data Privacy Communications practice.

Mobile security firm Zimperium has welcomed David Natker as its VP of Global Partners and Alliances.

More People On The Move

Expert Insights