Friday, April 4, 2025
HomeChromeChrome Security Update, 17 Vulnerabilities Patched

Chrome Security Update, 17 Vulnerabilities Patched

Published on

SIEM as a Service

Follow Us on Google News

Google has announced a significant security update for its Chrome browser, addressing 17 vulnerabilities in the latest build.

The update, which affects the Stable and Extended Stable channels, will roll out over the coming days and weeks for Windows, Mac, and Linux users.

Update Details

The Stable channel has been updated to versions 130.0.6723.58/.59 for Windows and Mac and 130.0.6723.58 for Linux.

Meanwhile, the Extended Stable channel has been updated to version 130.0.6723.59 for Windows and Mac. These updates are part of Google’s ongoing efforts to enhance browser security and protect users from threats.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

Security Fixes and Rewards

In this update, Google has patched 17 security vulnerabilities, with several fixes contributed by external researchers.

The company has awarded $66,000 in rewards to those who reported these issues. The table below summarizes the key vulnerabilities patched:

SeverityCVE IDDescriptionReward
HighCVE-2024-9954Use after free in AI$36,000
MediumCVE-2024-9955Use after free in Web Authentication$6,000
MediumCVE-2024-9956Inappropriate implementation in Web Auth$6,000
MediumCVE-2024-9957Use after free in UI$5,000
MediumCVE-2024-9958Inappropriate implementation in PictureInPicture$5,000
MediumCVE-2024-9959Use after free in DevTools$4,000
MediumCVE-2024-9960Use after free in Dawn$2,000
MediumCVE-2024-9961Use after free in Parcel Tracking$2,000
MediumCVE-2024-9962Inappropriate implementation in Permissions$1,000
MediumCVE-2024-9963Insufficient data validation in DownloadsTBD
LowCVE-2024-9964Inappropriate implementation in Payments$3,000
LowCVE-2024-9965Insufficient data validation in DevTools$1,000
LowCVE-2024-9966Inappropriate implementation in Navigations$1,000

Google continues to emphasize its commitment to security through internal audits and collaborations with external researchers.

The company utilizes tools such as AddressSanitizer and MemorySanitizer to detect vulnerabilities proactively.

Access to detailed bug information remains restricted until most users have applied the update to ensure comprehensive protection.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...

Australian Pension Funds Hacked: Members Face Financial Losses

Several of Australia’s largest superannuation funds have been targeted in a coordinated cyberattack, leading...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ex-ASML Russian Employee Smuggled Trade Secrets to Moscow via USB

A former employee of Dutch semiconductor firm ASML, identified as German A. (43), stands...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...