Friday, May 23, 2025
HomeChromeGoogle Chrome Security Update, Patch for High-severity Vulnerability

Google Chrome Security Update, Patch for High-severity Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Google has released a significant security update for its Chrome browser, aiming to address several vulnerabilities and enhance user safety.

The Stable channel has been updated to version 131.0.6778.108/.109 for Windows, and Mac, and version 131.0.6778.108 for Linux. These updates will be gradually rolled out to users over the coming days and weeks.

According to the Google Chrome report, this latest update includes four security fixes, with a notable contribution from external researchers.

- Advertisement - Google News

Due to security protocols, detailed information about specific bugs and links may be restricted until the majority of users have received the update.

This is a common practice to prevent exploitation and protect users while a bug exists in a third-party library that hasn’t been fixed yet.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

High-Severity Vulnerability: CVE-2024-12053

Among the highlighted fixes is the patch for a high-severity vulnerability identified as CVE-2024-12053.

This vulnerability pertains to a type of confusion issue in V8, Chrome’s JavaScript engine, which was reported by security researchers gal1ium and chluo on November 14, 2024.

For their contribution, these researchers have been awarded $8000 by Google, reflecting the company’s commitment to rewarding external contributions that enhance Chrome’s security.

This type of vulnerability can potentially allow attackers to execute arbitrary code within the browser, making it crucial for users to update their browsers to the latest version promptly.

In addition to external contributions, Google’s internal security efforts have been integral in addressing a wide range of vulnerabilities.

The update includes various fixes identified through internal audits and security initiatives, such as fuzzing.

Tools like AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL play a crucial role in detecting these security bugs, ensuring they are resolved before they can impact end-users.

Google extends its gratitude to all security researchers who collaborated during the development cycle to prevent vulnerabilities from reaching the stable channel.

The company encourages users to consider switching release channels if they are interested in experiencing updates sooner and invites users to report any new issues by filing a bug report.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to...

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code...

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager...