Google has released Chrome 95.0.4638.69 for Windows, Mac, and Linux to address two zero-day vulnerabilities, tracked as CVE-2021-38000 and CVE-2021-38003, actively exploited in attacks in the wild.
Google fixed a total of seven vulnerabilities with the latest release of the popular browser.
CVE-2021-38000 is an insufficient validation of untrusted input in Intents, the flaw was reported by Clement Lecigne, Neel Mehta, and Maddie Stone of Google Threat Analysis Group on 2021-09-15.
CVE-2021-38003 is an Inappropriate implementation in V8 open-source high-performance JavaScript and WebAssembly engine. This vulnerability was reported by Clément Lecigne from Google TAG and Samuel Groß from Google Project Zero on 2021-10-26
“Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003 exist in the wild.” reads the security advisory published by Google.
The IT giant did not reveal the details of the attacks exploiting the above flaws.
Google already addressed a total of fifteenth zero-day vulnerabilities since the beginning of the year, below is the complete list:
The full list of zero-days patched this year is:
Be sure to update your Chrome install to the latest 95.0.4638.69 version for Windows, Mac, and Linux.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Google)
[adrotate banner=”5″]
[adrotate banner=”13″]
A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…
China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…
The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…
Cybersecurity Observatory of the Unipegaso's malware lab published a detailed analysis of the Sarcoma ransomware.…
Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…
Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…
This website uses cookies.