Cyber Security News

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions of users worldwide.

The latest Stable channel update, version 130.0.6723.91/.92 for Windows and Mac and 130.0.6723.91 for Linux will be rolled out over the coming days and weeks.

This update extends to the Extended Stable channel with version 130.0.6723.92 for Windows and Mac.

Protecting Your Networks & Endpoints With UnderDefense MDR – Request Free Demo

Vulnerabilities Fixes

The update includes two crucial security fixes, underscoring Google’s commitment to maintaining a secure browsing environment.

Notably, these fixes were contributed by external researchers, highlighting the collaborative efforts in the cybersecurity community.

  1. CVE-2024-10487: Out of Bounds Write in Dawn
    • Severity: Critical. This vulnerability involved an out-of-bounds write issue in Dawn, a graphics abstraction layer used in Chrome. Such vulnerabilities can allow attackers to execute arbitrary code on a user’s system, making it critical to address promptly.
  2. CVE-2024-10488: Use After Free in WebRTC
    • Severity: High. This issue was identified in WebRTC, a technology enabling real-time communication in browsers. A use-after-free vulnerability can lead to unexpected behavior or even allow attackers to take control of a system.

Google continues prioritizing user safety by restricting access to bug details and links until most users have received the updates.

This cautious approach ensures that potential exploits remain undisclosed until systems are adequately protected. 

Moreover, Google remains vigilant about vulnerabilities in third-party libraries that other projects depend on but may not have addressed.

By maintaining these restrictions, Google helps safeguard Chrome users and the broader software ecosystem.

Google acknowledges and appreciates the invaluable contributions of security researchers who collaborate during the development cycle to prevent security bugs from reaching the stable channel. Their efforts play a crucial role in enhancing Chrome’s security framework.

Google provides resources and forums for assistance and community support for users interested in exploring different release channels or reporting new issues.

Users are encouraged to file bug reports if they encounter new issues and engage with the community help forum for guidance on common problems.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

VS Code Extension with 9 Million Installs Attacks Developers with Malicious Code

Microsoft has removed two widely-used Visual Studio Code (VS Code) extensions, “Material Theme Free” and…

2 hours ago

New Anubis Ransomware Targets Windows, Linux, NAS, and ESXi x64/x32 Environments

A new ransomware group, dubbed Anubis, has emerged as a significant threat in the cybersecurity…

2 hours ago

WordPress Admins Warned of Fake Plugins Injecting Malicious Links into Websites

A new wave of cyberattacks targeting WordPress websites has been uncovered, with attackers leveraging fake…

2 hours ago

LARVA-208 Hackers Compromise 618 Organizations Stealing Logins and Deploying Ransomware

A newly identified cybercriminal group, LARVA-208, also known as EncryptHub, has successfully infiltrated 618 organizations…

2 hours ago

RustDoor and Koi Stealer Malware Attack macOS to Steal Login Credentials

A new wave of sophisticated cyberattacks targeting macOS systems has been identified, involving two malware…

2 hours ago

Microsoft Defender Leverages Machine Learning to Block Malicious Command Executions

The modern cybersecurity landscape is witnessing an unprecedented surge in sophisticated attack techniques, with adversaries…

3 hours ago