"Chrome 118 Patches 20 Vulnerabilities"

Google recently announced the release of Chrome 118 to the stable channel with fixes for 20 vulnerabilities, including 14 reported by external researchers.  Google noted that the most severe of the externally reported flaws is CVE-2023-5218, a critical bug described as a use-after-free issue in Site Isolation, Chrome’s component responsible for preventing sites from stealing other sites’ data.  While Google does not provide details on CVE-2023-5218, use-after-free bugs in Site Isolation can typically allow attackers to perform a sandbox escape via a crafted HTML page, which could potentially allow them to execute arbitrary code.  Google has yet to determine the bug bounty reward for this vulnerability.  Chrome 118 also resolves eight medium-severity flaws reported by external researchers, six of which are inappropriate implementation issues in Fullscreen, Navigation, DevTools, Intents, Downloads, and Extensions API.  Google noted that a use-after-free vulnerability in Blink History and a heap buffer overflow bug in PDF, both medium-severity flaws, were also resolved.  The remaining five externally reported issues patched in this browser release are low-severity vulnerabilities: four inappropriate implementations and a use-after-free.  Google says it handed over $30,000 in bug bounty rewards to the reporting researchers.  Google did not mention if any of these vulnerabilities are being exploited in malicious attacks.  The latest Chrome release is now rolling out as version 118.0.5993.70 for macOS and Linux and as versions 118.0.5993.70/.71 for Windows.

 

SecurityWeek reports: "Chrome 118 Patches 20 Vulnerabilities"

Submitted by Adam Ekwall on