Google Chrome Security Update – Multiple High-Severity Vulnerabilities Patched
-1.webp)
In a security change for Chrome, Google has updated the Real and Extended steady channels to 116.0.5845.110 for Mac and Linux and 116.0.5845.110/.111 for Windows. Over the upcoming days and weeks, this change will doubtless be released.
On this release, there are 5 security fixes. Four security points had been assigned a “high-severity” ranking, while one used to be assigned a “medium severity” ranking.
Excessive-Severity Vulnerabilities Fastened
Spend after free in Vulkan tracked as CVE-2023-4430, which had a high severity fluctuate, has been fastened. Cassidy Kim (@cassidy6564) reported this inform and used to be given a prize of $10000.
The high-severity use after free in Loader tracked as CVE-2023-4429 is fastened. The researcher who stumbled on this obtained a bounty of $3000.
This high severity Out of bounds reminiscence earn true of entry to in CSS tracked as CVE-2023-4428 is fastened. It used to be reported by Francisco Alonso (@revskills) and rewarded with $2000.
The Out of bounds reminiscence earn true of entry to in V8 with high severity fluctuate is tracked as CVE-2023-4427 is fastened. The inform used to be reported by Sergei Glazunov of Google Mission Zero.
Medium-Severity Vulnerability Fastened
An out-of-bounds reminiscence earn true of entry to in Fonts with a medium severity fluctuate tracked as CVE-2023-4431 is fastened. The flaw used to be reported by Microsoft Security Researcher.
Chrome Security Update
- Chrome for Linux and macOS: Chrome 116.0.5845.110
- Chrome for Windows: Chrome 116.0.5845.110 or Chrome 116.0.5845.111
Update Google Chrome
- For your computer, commence Chrome.
- At the pause upright, click on Extra.
- Click on Support about Google Chrome.
- Click on Update Google Chrome. Well-known: If you furthermore could can’t earn this button, you’re on the most modern model.
- Click on Relaunch.
Making use of the change as soon as conceivable is often recommended to guard the browser and blueprint against any flaws.
Source credit : cybersecuritynews.com