KLA12438
Multiple vulnerabilities in Google Chrome

Updated: 02/03/2022
Detect date
?
02/01/2022
Severity
?
High
Description

Multiple vulnerabilities were found in Google Chrome. Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. Implementation vulnerability in Extensions Platform can be exploited to cause denial of service.
  2. Use after free vulnerability in Web Search can be exploited to cause denial of service or execute arbitrary code.
  3. Use after free vulnerability in Reader Mode can be exploited to cause denial of service or execute arbitrary code.
  4. Implementation vulnerability in Full Screen Mode can be exploited to cause denial of service.
  5. Use after free vulnerability in Thumbnail Tab Strip can be exploited to cause denial of service or execute arbitrary code.
  6. Use after free vulnerability in Accessibility can be exploited to cause denial of service or execute arbitrary code.
  7. Use after free vulnerability in Cast can be exploited to cause denial of service or execute arbitrary code.
  8. Use after free vulnerability in Payments can be exploited to cause denial of service or execute arbitrary code.
  9. Use after free vulnerability in Windows Dialog can be exploited to cause denial of service or execute arbitrary code.
  10. Out of bounds memory access vulnerability in V8 can be exploited to cause denial of service.
  11. Heap buffer overflow vulnerability in ANGLE can be exploited to cause denial of service.
  12. Implementation vulnerability in Pointer Lock can be exploited to cause denial of service.
  13. Use after free vulnerability in Safe Browsing can be exploited to cause denial of service or execute arbitrary code.
  14. Use after free vulnerability in Screen Capture can be exploited to cause denial of service or execute arbitrary code.
  15. Use after free vulnerability in Extensions can be exploited to cause denial of service or execute arbitrary code.
  16. Type confusion vulnerability in V8 can be exploited to cause denial of service.
  17. Implementation vulnerability in Scroll can be exploited to cause denial of service.
  18. Policy bypass vulnerability in COOP can be exploited to bypass security restrictions.
Affected products

Google Chrome earlier than 98.0.4758.80

Solution

Update to the latest version
Download Google Chrome

Original advisories

Stable Channel Update for Desktop

Impacts
?
ACE 
[?]

DoS 
[?]

SB 
[?]
Related products
Google Chrome
Find out the statistics of the vulnerabilities spreading in your region