Description

On March 26, 2024, Google issued a security update for its Chrome browser, addressing seven vulnerabilities, with four reported by external researchers. Among these, the most severe is a use-after-free bug in ANGLE, a cross-platform graphics engine also utilized in other popular browsers. Identified as CVE-2024-2883, Google acknowledges the discovery of this bug by an external researcher, who received a $10,000 bug bounty reward. Additionally, three other high-severity vulnerabilities were reported by external researchers. The first, CVE-2024-2885, is a use-after-free issue in Dawn. The remaining two, CVE-2024-2886 and CVE-2024-2887, are zero-day vulnerabilities that were exploited and reported at the recent Pwn2Own Vancouver 2024 hacking contest. No extra bounty rewards were provided for these issues beyond those earned at the competition. CVE-2024-2886, a use-after-free in WebCodecs, was demonstrated by Seunghyun Lee of KAIST Hacking Lab, who exploited two such issues during the contest and earned a total of $145,000 in rewards. CVE-2024-2887, a Type Confusion bug in WebAssembly, was exploited by security researcher Manfred Paul, who earned a $42,500 reward for it. Paul also demonstrated vulnerabilities in Safari and Firefox, winning over $200,000 in rewards and the competition itself. Mozilla promptly released patches for the zero-day demonstrated at Pwn2Own. The latest Chrome update, version 123.0.6312.86/.87 for Windows and macOS, and version 123.0.6312.86 for Linux, is now rolling out. Although Google has not indicated any exploitation of these vulnerabilities in the wild, users are strongly advised to update their browsers without delay to mitigate potential risks.