Then all you have to do is relaunch the browser in order for the update to complete. If there is an update available, Chrome will notify you and start downloading it. My preferred method is to have Chrome open the page chrome://settings/help which you can also find by clicking Settings > About Chrome. And now would be a good time, given the severity of the vulnerabilities in this batch. So, it doesn’t hurt to check now and then. But you can end up lagging behind if you never close the browser or if something goes wrong-such as an extension stopping you from updating the browser. The easiest way to update Chrome is to allow it to update automatically, which basically uses the same method as outlined below but does not require your attention. Google Chrome is a fast web browser available at no charge. Android users will also find an update waiting. If you’re a Chrome user on Windows, Mac, or Linux, you should update as soon as possible. These Views are responsible for rendering, layout, and event handling. The Chrome user interface is constructed of a tree of components called Views. (Service workers are specialized JavaScript assets that act as proxies between web browsers and web servers.)ĬVE-2022-2481 is a use-after-free vulnerability in Views. No further details were given but successful exploitation requires user interaction by the victim.ĬVE-2022-2480is a use-after-free vulnerability in Chrome's Service Worker API. Google Chrome - Download the Fast, Secure Browser from Google Google uses cookies to deliver its services, to personalize ads, and to analyze traffic. Not many details are available but the attacker needs the victim to engage in some kind of user interaction to exploit this vulnerability.ĬVE-2022-2479 is caused by insufficient validation of untrusted input in File. The four high-severity use-after-free vulnerabilities resolved with the latest Chrome update are tracked as follows:ĬVE-2022-2477 is a use-after-free vulnerability in Guest View that could allow arbitrary code execution following interaction by the victim.ĬVE-2022-2478 is a use-after-free vulnerability in Chrome's PDF handling code. Its goal is to make it easier to share data across separate vulnerability capabilities (tools, databases, and services). Publicly disclosed computer security flaws are listed in the Common Vulnerabilities and Exposures (CVE) database. Google Chrome, currently holding a dominant 66.13 share of the browser market, is known for its constant development and innovation.In the latest Chrome 113 update, Google introduced the WebGPU. If after freeing a memory location, a program does not clear the pointer to that memory, an attacker can use the error to manipulate the program. Of the 11 security fixes five are use-after-free issues, including four that are marked with a severity of “high.” Use after free (UAF) vulnerabilities occur because of the incorrect use of dynamic memory during a program’s operation. Google Chrome's Stable channel has been updated to 1.134 for Windows, Mac, and Linux, and the new version will roll out over the coming days/weeks. To immediately check for and install any available updates, click the three-dot menu icon and click Help > About Google Chrome.The latest Google Chrome update includes 11 security fixes, some of which could be exploited by an attacker to take control of an affected system.
0 Comments
Leave a Reply. |