top | item 30813779

Chrome 0day is being exploited now for CVE-2022-1096; update immediately

265 points| gargarplex | 3 years ago |forbes.com

145 comments

order

ainar-g|3 years ago

Looks like these are the two commits, based on the issue number:

https://github.com/v8/v8/commit/0981e91a4f8692af337e2588562a...

https://github.com/v8/v8/commit/a2cae2180a7a6d64ccdede44d730...

Although there could be others.

menomatter|3 years ago

From those commits, would you say this is RCE vulnerability taking advantage of memory/stack callbacks? Does this mean an attacker may exploit this vulnerability to compromise an entire system?

emerged|3 years ago

Interesting, I’ve never seen the “maybe_db” style of variable naming. Makes sense but looks weird.

tommiegannert|3 years ago

Looks like 99.0.4844.84 is the release we want.

https://chromereleases.googleblog.com/2022/03/stable-channel...

rikroots|3 years ago

Release 99.0.4844.84 has borked my JS canvas library. Currently working on a fix - it was my misunderstanding of the purpose of the CanvasAPI willReadFrequently flag that left the library open to a severe speed degradation.

In my defence the documentation implies that the willReadFrequently flag is only a hint to the browser, to take a different approach when performing getImageData() operations[1]. However setting the flag to true also impacts drawImage() functionality[2].

I tried reporting the issue as a bug last night - at the very least the issue needs to be documented - but the form for reporting issues kept collapsing on me so I gave up.

[1] - https://developer.mozilla.org/en-US/docs/Web/API/HTMLCanvasE...

[2] - minimum demo of issue - https://codepen.io/kaliedarik/pen/bGaqMVj

techolic|3 years ago

I just upgraded to this and noticed the Reading List has changed design again! They must have gone back and forth thousands of times on this so hopefully this is the final version.

metadat|3 years ago

It's definitely not yet out for Android.

On my device the version is stuck at: 99.0.4844.73

_Nat_|3 years ago

> Not much is known, at least publicly, at this stage about CVE-2022-1096 other than it is a "Type Confusion in V8." This refers to the JavaScript engine employed by Chrome.

Is there a safer JavaScript engine folks can use without having to worry about this sorta thing? Even if it's slower, less compatible, more resource-intensive, etc.?

I feel like, in most cases, I could make due with JavaScript being 10x or even 100x slower, taking up 10x the RAM, lacking some uncommon features, and so forth -- if it meant being able to enable it without needing to worry about new zero-days.

meibo|3 years ago

What you're asking for will probably put you more at risk than V8 does:

1) JavaScript engines with any kind of usable performance are inherently complex

2) V8 is hardened, battle-tested and fuzzed/verified by the best engineers at Google and indepentently by third party researchers, since inception - the engine you will be using probably won't be

All of this is really a side-effect of Chrome's popularity and Google's resources, even the CVE itself. You would be relying on security by obscurity(in which obscurity = no big userbase = not a high value target). Have a look at payouts for RCE-capable V8 bugs.

gruez|3 years ago

>Is there a safer JavaScript engine folks can use without having to worry about this sorta thing? Even if it's slower, less compatible, more resource-intensive, etc.?

You can disable JIT in firefox[1], which makes it fall back to an interpreter. That should theoretically make it safer as there are less optimizations going on and less generated code being directly executed by the CPU.

[1] https://github.com/arkenfox/user.js/blob/b4225baaf2f8d15f856...

azornathogron|3 years ago

If you're worried about browser vulnerabilities in the javascript engine, have you considered disabling javascript by default and enabling it per-site on just the sites that you trust?

kerng|3 years ago

Microsoft has added some mitigtions to Edge a few months ago as defense in depth - wondering now if this is actually exploitable on Edge or if their mitigations prevent it? Any Microsoft/Edge security people on here?

Update: found the original blog from Microsoft, they call it Super Duper Secure Mode: https://microsoftedge.github.io/edgevr/posts/Super-Duper-Sec...

Ourgon|3 years ago

> I feel like, in most cases, I could make due with JavaScript being 10x or even 100x slower, taking up 10x the RAM, lacking some uncommon features, and so forth -- if it meant being able to enable it without needing to worry about new zero-days.

Not on the "modern web" you wouldn't, even the current speedy versions of V8 and ${whatever}monkey now used by Firefox the thing often is brought to a crawl by the deluge of Javascript. Imagine your current browser, only 100 times slower and 10 times more memory-hungry.

Nope, the solution lies in getting rid of most of the Javascript on most pages. uBlock and uMatrix can help a bit but the real solution lies with web developers. If and when that goal is achieved it would be possible to browse the web using a slow-but-'safe' browser. Some pages (e.g. SPAs) really depend on all that Javascript and as such won't be useable withour 'modern' JS engines but there is no reason for e.g. your bank or payment processor's pages to depend on near-native speed Javascript engines.

charcircuit|3 years ago

Don't forget that there is a sandbox. Even if there is a vulnerability with V8 you need to pair it with a vulnerability with the sandbox to exploit the system.

azornathogron|3 years ago

There are certainly other javascript implementations. For example, here's one I stumbled upon recently that's written in plain Go: https://github.com/dop251/goja

Of course, it won't help you since it's not built into a web browser.

svenfaw|3 years ago

For Windows, IE11/Trident. This may sound ridiculous, but if you think about it, it's still maintained security-wise (and will be forever, as per MS), and since its codebase has been frozen a few years ago, its attack surface can only shrink with time.

So if you're OK with the limited compatibility, it might be worth considering.

lcall|3 years ago

I like that in chrome one can turn off javascript and images by default, then re-enable it for select sites only, or leave a tab open to re-enable it temporarily only.

paxys|3 years ago

You are making the assumption that an engine with fewer optimizations that runs slower will be safer by default, but I fail to see the connection between the two.

mdb31|3 years ago

Chromium-based versions of Microsoft Edge are also vulnerable: updating to 99.0.1150.55 fixes this CVE

gruez|3 years ago

Is there a site/service/mailing list that provides notifications for critical/RCE/in-the-wild exploit patches? Keeping every piece of software you run up-to-date takes a lot of work, and something like that would help with knowing what to prioritize.

lcall|3 years ago

I subscribe to debian and openbsd security advisory email lists, which works for me generally to know what is going on in the space(s) I care more about:

https://lists.debian.org/debian-security-announce/ (this one covers security updates to many packages, but not as much as CVE advisories cover, windows, etc)

https://www.debian.org/security/

https://www.openbsd.org/mail.html (ctrl-f for security, but unlike the debian ones, this only covers patches to the base OS, not other packages).

But for you of course it would depend on what you run and what matters to you.

newman555|3 years ago

funny enough, was asking my self the same question yesterday after 5-minute googling didn’t get me anywhere. I see a recommendation mentioned below, but as I also saw, hard to find something where you can control signal to noise ratio

fn-mote|3 years ago

I use snap for some applications in spite of the trouble it has caused me. I was super-happy to find out that it had upgraded me to a not-vulnerable verson of chromium before I even knew to look.

For all of the (deserved) hate snap gets, there are some shining up sides.

the_common_man|3 years ago

I use apt and it didn't update to this vulnerable version in the first place, so there's that

nathants|3 years ago

securing a machine that is updated regularly and runs untrusted code is not realistic, monitoring network exfil is.

an exploit that cannot communicate is likely benign and easy to detect in the attempt.

monitor all outbound network connections with a gui prompt that defaults to deny. whitelist trusted domains/ip for a better experience and a bit less security.

macos has littlesnitch[1], linux has opensnitch[2], or roll your own on libnetfilterqueue[3].

bonus points if the filtering happens upstream at a router or wireguard host so a compromised machine cannot easily disable filtering.

bonus points if the filtering is at executable level granularity instead of system level.

1. https://www.obdev.at/products/littlesnitch/index.html

2. https://github.com/evilsocket/opensnitch

3. https://github.com/nathants/tinysnitch

figglestar|3 years ago

> monitor all outbound network connections with a gui prompt that defaults to deny. whitelist trusted domains/ip for a better experience and a bit less security.

> bonus points if the filtering happens upstream at a router or wireguard host so a compromised machine cannot easily disable filtering.

Is it possible to combine these two with open/tinysnitch somehow? It'd be nice to easily build a whitelist but with the way Windows works I couldn't trust any firewall that was running on Windows itself.

t3odump|3 years ago

I would like to analyze the issue of browser security without controversy. The mitigations that Edge puts into practice (I'm talking about "Super Duper Secure" and "Enhanced Security") can prevent the operation of exploits in the V8 engine like this 0-day?

Is this platform dependent or the mitigation in progress works well? I mean for example some feature on mac and Linux is available out of the box asACG feature.

This analysis is very interesting because I have only read analisys related to privacy and not about security and integrity. (I mean compare between Chorme, Edge, Brave, etc ...)

janci|3 years ago

Is Chrome for android affected? And V8 in nodejs?

buro9|3 years ago

Type confusion in V8... May well impact Cloudflare workers too.

dknecht|3 years ago

We have already tested and global rollout started earlier today.

stjohnswarts|3 years ago

Yeah wondering if this also a 0 day for node.js and electron apps...

ruuda|3 years ago

Type confusion in V8 ... Fortunately I turned off javascript by default since Meltdown/Spectre.

dijit|3 years ago

I did the same. But the web is basically unusable for me now and devs seem unsympathetic.

amelius|3 years ago

Is Electron at risk too?

neoneye2|3 years ago

Visual Studio Code is built with Electron. VSCode has lots of extensions available. Can a VSCode extension exploit this 0day?

scambier|3 years ago

If your Electron app executes third party, remote code. But if it does, you should definitely not use it.

sysOpOpPERAND|3 years ago

why is chrome having so many updates within the past few months? is it because of coverage? (more users?). i use chrome off and on between that and firefox depending on the site and i am surprised how often i've been reading about issues with chrome.

should i switch browsers all together?

eternityforest|3 years ago

Basically everyone seems to be getting hacked. It's like all the hackers in the world snorted something and have been hacking nonstop all month.

hulitu|3 years ago

Every browser has updates every couple of weeks (without bringing nothing new). Quality of SW development has plumeted.

whatev1942|3 years ago

What about CloudFlare ? Does this bring to question their decision to use V8 ?

paulpauper|3 years ago

this just goes to show that updates are always 2 or so steps behind. It's a near certainty that governments, top criminal organizations have a trove of exploits for all major programs, and new ones created after old ones get patched.

johndfsgdgdfg|3 years ago

[deleted]

ptk|3 years ago

I don’t know if you’re joking or not, and I say this as someone who uses Edge as their primary browser, but Edge does not improve the situation you describe. Edge is just a flavor of chromium at this point and absolutely gives Chrome a run for its money in the tracking and telemetry department.

aceBacker|3 years ago

Heh, my corp locks down the edge updates and bundles them with the OS updates. Edge is going to be vulnerable to this one for months maybe a year longer that chrome.

hungryforcodes|3 years ago

Windows 10 is definitely spyware. So migrating to Edge is hardly a solution. Chromium on the other hand...

baq|3 years ago

Just what the doctor ordered in the middle of a war which is also waged in the information space. Hopefully the fact that it’s in v8 will take the exploit a bit longer than usual to proliferate.

octoberfranklin|3 years ago

When the web "standards" are so insanely complicated that even Google can't implement them securely, it's time to admit that we have a problem.

When there is only one other complete implementation of these "standards" (with miniscule market share), it's time to panic.

dclusin|3 years ago

It feels to me like the entire os security model is broken and leaving security up to applications even well resourced ones like chrome is a fools errand.

Is there anyway we could benefit from starting again and building a secure os from first principles? Isn’t this one of Fuscias goals?

bawolff|3 years ago

There is no indication yet that this is due to complex web standards. It could be, but we literally dont know what the bug is yet.

kerng|3 years ago

Dont think this has todo with web standards, its probably JIT related. Google should just turn that off, majority of 0 days seem to be because of that.