Google today released Chrome 86.0.4240.183 for Windows, Mac, and Linux to address 10 security vulnerabilities including a remote code execution (RCE) zero-day exploited in the wild.
The zero-day was reported by Clement Lecigne of Google’s Threat Analysis Group and Samuel Groß of Google Project Zero on October 29, 2020.
The RCE vulnerability is tracked as CVE-2020-16009 and it is described as an inappropriate implementation in V8, Google’s open-source and C++ based high-performance WebAssembly and JavaScript engine.
While Google says that it “is aware of reports that an exploit for CVE-2020-16009 exists in the wild,” the company did not provide any details regarding the threat actors behind these attacks.
“Access to bug details and links may be kept restricted until a majority of users are updated with a fix,” Google adds.
“We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.”
Also Read: Letter of Consent MOM: Getting the Details Right
Today, Google patched another zero-day in Chrome for Android exploited in the wild, a sandbox escape vulnerability tracked as CVE-2020-16010.
CVE-2020-16009 is the second actively exploited Chrome zero-day patched within the last two weeks after a heap buffer overflow zero-day bug found in the FreeType text-rendering library.
Last week, Google’s Project Zero 0day bug-hunting team disclosed an actively exploited Windows kernel elevation of privileges (EoP) zero-day tracked as CVE-2020-17087, affecting all versions between Windows 7 and Windows 10.
Google also fixed six other high severity security vulnerabilities in Chrome 86.0.4240.183:
Chrome 86.0.4240.183 is rolling out to users during the next days/weeks. Desktop users can upgrade by going to Settings -> Help -> About Google Chrome.
Also Read: CCTV Law Singapore Edition: Know Your Rights and Responsibilities
The web browser will then automatically check for the new update and install it when available.
Update November 02, 16:52 EST: Added info on actively exploited zero-day in Chrome for Android.