Google Chrome < 119.0.6045.199
An integer overflow in Chrome's Skia graphics library can be triggered by a malicious image or SVG, leading to memory corruption and potential code execution.
An attacker can serve a malicious web page containing crafted graphical content to trigger the integer overflow. Exploitation can lead to renderer process crash or, with additional research, code execution in the renderer sandbox. A complete exploit chain would require additional sandbox escape.
Google Chrome uses the Skia graphics library to render images, SVG, and canvas content. An integer overflow vulnerability in Skia can be triggered by crafted graphical content served from a web page. The overflow can lead to heap corruption in the renderer process.
Probably yes if any of these apply:
Affected OS versions
Skia vulnerabilities have historically been leveraged in targeted browser exploitation campaigns. The integer overflow class is particularly concerning as it can be reliably triggered and produces deterministic memory corruption.
Manual remediation steps
⏱ 10 minutesCheck Current Version
(Get-ItemProperty 'HKLM:\SOFTWARE\Google\Chrome\BLBeacon').version
Update Chrome
Verification
(Get-ItemProperty 'HKLM:\SOFTWARE\Google\Chrome\BLBeacon').version
# Must show 119.0.6045.199 or later
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.
References