ADVISORY!

TLP : CLEAR

Date : 12/08/2024

REF NO : CERT / 2024/08/72

ChromeOS Multiple Vulnerabilities

Severity Level: High

Components Affected

Version prior to 120.0.6099.318 (Platform Version: 15662.115)

Overview

Multiple vulnerabilities were identified in ChromeOS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition and remote code execution on the targeted system.

Note:

Exploit in the wild has been detected for CVE-2024-36971. The vulnerability potentially allows an attacker with System execution privileges to perform remote code execution in kernel. The risk level is rated to High Risk.

Description

Several significant vulnerabilities have been addressed in recent updates to Google Chrome and the Linux kernel. In Google Chrome prior to version 125.0.6422.141, an out-of-bounds memory access in the browser’s UI allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page, particularly when the user was convinced to engage in specific UI gestures. Another vulnerability in Chrome, specifically a type confusion issue in the V8 JavaScript engine prior to version 126.0.6478.114, permitted remote attackers to execute arbitrary code through a crafted HTML page. In the Linux kernel, a vulnerability in the __dst_negative_advice() function was resolved, which previously failed to enforce proper Read-Copy-Update (RCU) rules when clearing sk->dst_cache. This oversight could lead to a Use-After-Free (UAF) scenario. The vulnerability was particularly problematic in UDP socket operations, and the fix involved ensuring that sk_dst_reset(sk) is correctly implemented across all negative advice methods. This update, which was acknowledged by Clement Lecigne, ensures the robustness and security of the network stack in the Linux kernel.

Impact

  • Remote Code Execution
  • Denial of Service

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor. For detail, please refer to the link below:

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC