"Google is aware that exploits for CVE-2021-38000 and CVE-2021-38003 exist in the wild," said Google as it notified users of the updated release in the Stable channel.
Both of the exploited vulnerabilities were caught by Google researchers, CVE-2021-38000 by Clement Lecigne, Neel Mehta, and Maddie Stone of Google Threat Analysis Group, and CVE-2021-38003 by Lecigne.
We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.
As the bugs are being actively exploited BleepingComputer suggests that users restart their browser to pull in the new release, or update to it manually.
Google describes the CVE-2021-38000 zero-day vulnerability as an "Insufficient validation of untrusted input in Intents", pointing out that it was reported last month on September 15, 2021.
Since the vulnerabilities are still being exploited, in order to prevent further abuse, Google hasn’t yet shared details about the zero-days or how they are being exploited. However, Google’s security researchers do usually share details about the exploits once the threat has passed.
Importantly though, with these latest round of fixes, Google has patched 15 Chrome zero-day vulnerabilities since the beginning of 2021, many of which were being actively exploited in the wild, clearly indicating that Chrome has become one of the favourite targets of threat actors.