SB2023072105 - Multiple vulnerabilities in Google ChromeOS
Published: July 21, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Use-after-free (CVE-ID: N/A)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error. A remote attacker can trick the victim to open a specially crafted website and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
2) Use-after-free (CVE-ID: CVE-2023-3729)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the in Ash component. A remote attacker can trick the victim to open a specially crafted website and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
3) Use-after-free (CVE-ID: CVE-2023-3731)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a use-after-free error within the in Ash component. A remote attacker can trick the victim to open a specially crafted website and execute arbitrary code on the system.
Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.
4) Out-of-bounds read (CVE-ID: CVE-2023-3497)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition in Titan C firmware. A local user can trigger an out-of-bounds read error and perform a denial of service (DoS) attack.
5) Input validation error (CVE-ID: CVE-2023-3739)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A local user can pass specially crafted input to the system and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html
- https://bugs.chromium.org/p/chromium/issues/detail?id=1444766
- https://bugs.chromium.org/p/chromium/issues/detail?id=1451803
- https://bugs.chromium.org/p/chromium/issues/detail?id=1441306
- https://bugs.chromium.org/p/chromium/issues/detail?id=1459277
- https://bugs.chromium.org/p/chromium/issues/detail?id=1398986