Google has issued fixes for five security flaws, including a high-severity bug that is being actively exploited by attackers. The fixes are part of a Monday update of the Stable channel to version 96.0.4664.110 for Windows, Mac and Linux.
“Google is aware of reports that an exploit for CVE-2021-4102 exists in the wild,” according to the security advisory. As is standard for Chrome security advisories, bug details are not being released until a “majority of users are updated with a fix.” Google was alerted to the flaw by an anonymous reporter on Dec. 9.
Other vulnerabilities addressed in the Chrome update include a critical-severity, insufficient data validation issue in Mojo (CVE-2021-4098). According to Chromium, Mojo is a communication framework that facilitates the passing of messages across arbitrary inter- and intra-process boundaries. Other high-severity Google Chrome vulnerabilities include a use-after-free (CVE-2021-4099) bug and heap buffer overflow (CVE-2021-4101) flaw in the Swiftshader software 3D renderer, as well as an object lifecycle issue (CVE-2021-4100) in ANGLE, an open-source, cross-platform graphics engine abstraction layer.
This latest actively exploited flaw brings Google Chrome’s tally to 17 zero-day bugs discovered so far this year, including including two high-severity bugs fixed in October and a use-after-free zero-day vulnerability in the WebGL component of Chromium, which was patched in June (CVE-2021-30554). That amount exceeds the total number from previous years, including the eight zero-day vulnerabilities that were discovered in 2020, according to a spreadsheet maintained by Google researchers.
Original Source by [author_name]