Chrome fixes zero-day flaws under hacker attack — update now

Google Chrome update
(Image credit: Shutterstock)

Google yesterday (Oct. 28) pushed out an update for Chrome on the desktop that fixes eight security vulnerabilities, including two serious "zero-day" flaws that are already under attack by hackers unnamed.

The update takes Chrome to version 95.0.4638.69 for Windows, Mac and Linux. Windows and Mac users can usually just relaunch the browser to install the update, while Linux users may have to wait until their distribution bundles the update into its regular update package.

Otherwise, you can force a Chrome update by clicking the three vertical dots at the top right of the browser window, then mousing down and clicking Help. Click "About Google Chrome" in the fly-out menu that appears, and a new tab will either tell you that Chrome is up-to-date or will download the update.

How these Chrome flaws can be exploited

The first of the two zero-day flaws patched involves "insufficient validation of untrusted input in Intents," a protocol whereby Chrome finds the best web app to handle a particular purpose (catalogued as vulnerability CVE-2021-38000). The other allows "inappropriate implementation in V8," Chrome's JavaScript engine (catalogued as vulnerability CVE-2021-38003).

We're going to guess that the first permits a web app to do naughty things, while the second permits a website to do the same. Google isn't saying anything further.

Because the reporters of these flaws all work for Google, they likely won't be getting any bug-bounty money. But external researchers will be for some of the other flaws patched, including Wei Yuan of MoyunSec VLab, who will net $10,000 for his discovery of a "use-after-free" bug in Chrome's sign-in protocol. 

Use-after-free means that the memory space wasn't properly reallocated after the protocol finished using it, potentially allowing a malicious program to literally invade the space.

The other four described flaws also have to do with use-after-free issues, insufficient validation, V8 or some combination of those. Google isn't saying anything about the eighth vulnerability being patched.

Zero-days as far as the eye can see

Some other browsers that share the Chromium open-source underpinnings with Chrome have also updated to the new version, including Brave and Microsoft Edge. (Like Chrome, you can just relaunch those to update them.) Others, such as Opera and Vivaldi, are not quite there yet.

Google has patched more than a dozen zero-days flaws already in this exceptionally busy year. We're not sure if that's a good thing, indicating a greater share of flaws may be being found, or a bad thing that there may be more zero-days in general.

Here's a list of recent Chrome desktop updates.

Paul Wagenseil

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has also been a dishwasher, fry cook, long-haul driver, code monkey and video editor. He's been rooting around in the information-security space for more than 15 years at, SecurityNewsDaily, TechNewsDaily and Tom's Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown up in random TV news spots and even moderated a panel discussion at the CEDIA home-technology conference. You can follow his rants on Twitter at @snd_wagenseil.