EHA
Home Cyber Security News Critical Chrome Vulnerabilities Allow Arbitrary Code Execution

Critical Chrome Vulnerabilities Allow Arbitrary Code Execution

0

Google has initiated a phased rollout of Chrome Stable Channel version 137.0.7151.119/.120 for Windows and macOS, and 137.0.7151.119 for Linux systems.

The update addresses multiple security vulnerabilities and includes stability improvements, with a full changelog accessible via the Chrome Log.

Users can expect automatic updates over the coming weeks, though manual checks through chrome://settings/help are recommended for enterprise environments requiring immediate deployment.

High-Severity Security Fixes and Researcher Contributions

This release includes three security fixes, two of which were identified by external researchers through Chrome’s Vulnerability Rewards Program (VRP).

Key resolved issues include:

1. CVE-2025-6191: V8 Engine Integer Overflow

  • Severity: High
  • Reward: $7,000 (Bug ID: 420697404)
  • Technical Impact: An integer overflow in the V8 JavaScript engine could allow arbitrary code execution or browser crashes via malicious input.
  • Researcher: Shaheen Fazim (reported May 27, 2025).

2. CVE-2025-6192: Profiler Use-After-Free Vulnerability

  • Severity: High
  • Reward: $4,000 (Bug ID: 421471016)
  • Technical Impact: Memory corruption in the Profiler component might enable code execution through improper memory management.
  • Researcher: Chaoyuan Peng (@ret2happy, reported May 31, 2025).

Restricted Access Notice: Full exploit details remain embargoed until most users update, particularly for flaws affecting third-party dependencies.

Risk Factor Table

CVE IDVulnerabilitySeverityRewardPotential Impact
CVE-2025-6191Integer overflow in V8High$7000Arbitrary code execution, browser crash
CVE-2025-6192Use-after-free in ProfilerHigh$4000Memory corruption, code execution

Internal Security Initiatives and Tooling

Google’s internal teams resolved additional vulnerabilities through:

  • MemorySanitizer and AddressSanitizer: Detected memory corruption risks.
  • UndefinedBehaviorSanitizer: Flagged non-compliant code paths.
  • libFuzzer/AFL: Enabled automated fuzz testing for edge-case scenarios.

A third fix (Bug ID: 425443272) stemmed from audits of Control Flow Integrity (CFI) mechanisms, ensuring runtime protection against code-reuse attacks.

Recommendations for Users:

  • Enterprise admins should prioritize deployment using tools like Google Admin Console.
  • Researchers can report vulnerabilities via Chrome’s bug tracker.
  • For update issues, consult the Chrome Help Forum.

This update underscores Chrome’s commitment to collaborative security, blending external researcher insights with advanced internal tooling to mitigate zero-day risks.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version