Cyber Security News

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address several vulnerabilities and enhance user safety.

The Stable channel has been updated to version 131.0.6778.108/.109 for Windows, and Mac, and version 131.0.6778.108 for Linux. These updates will be gradually rolled out to users over the coming days and weeks.

According to the Google Chrome report, this latest update includes four security fixes, with a notable contribution from external researchers.

Due to security protocols, detailed information about specific bugs and links may be restricted until the majority of users have received the update.

This is a common practice to prevent exploitation and protect users while a bug exists in a third-party library that hasn’t been fixed yet.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar

High-Severity Vulnerability: CVE-2024-12053

Among the highlighted fixes is the patch for a high-severity vulnerability identified as CVE-2024-12053.

This vulnerability pertains to a type of confusion issue in V8, Chrome’s JavaScript engine, which was reported by security researchers gal1ium and chluo on November 14, 2024.

For their contribution, these researchers have been awarded $8000 by Google, reflecting the company’s commitment to rewarding external contributions that enhance Chrome’s security.

This type of vulnerability can potentially allow attackers to execute arbitrary code within the browser, making it crucial for users to update their browsers to the latest version promptly.

In addition to external contributions, Google’s internal security efforts have been integral in addressing a wide range of vulnerabilities.

The update includes various fixes identified through internal audits and security initiatives, such as fuzzing.

Tools like AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL play a crucial role in detecting these security bugs, ensuring they are resolved before they can impact end-users.

Google extends its gratitude to all security researchers who collaborated during the development cycle to prevent vulnerabilities from reaching the stable channel.

The company encourages users to consider switching release channels if they are interested in experiencing updates sooner and invites users to report any new issues by filing a bug report.

Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

DragonForce Ransomware Targets Major UK Retailers, Including Harrods, Marks & Spencer, and Co-Op

Major UK retailers including Harrods, Marks and Spencer, and Co-Op are currently experiencing significant service…

11 minutes ago

OpenAI Shifts For-Profit Branch to Public Benefit Corporation, Staying Under Nonprofit Oversight

Landmark organizational shift, OpenAI announced its transition from a capped-profit LLC to a Public Benefit…

46 minutes ago

Google’s NotebookLM Introduces Voice Summaries in Over 50 Languages

Google has significantly expanded the capabilities of NotebookLM, its AI-powered research tool, by introducing Audio…

1 hour ago

Android Security Update -A Critical RCE Vulnerability Actively Exploited in the Wild

Google has released critical security patches for Android devices to address 57 vulnerabilities across multiple…

1 hour ago

Hackers Exploit Fake Chrome Error Pages to Deploy Malicious Scripts on Windows Users

Hackers are leveraging a sophisticated social engineering technique dubbed "ClickFix" to trick Windows users into…

2 hours ago

New ClickFix Attack Imitates Ministry of Defence Website to Target Windows & Linux Systems

A newly identified cyberattack campaign has surfaced, leveraging the recognizable branding of India's Ministry of…

3 hours ago