Google has updated the Stable and Extended Stable channels for Mac, Linux, and Windows to version 116.0.5845.140/.141 to address a security issue in Chrome.
One “high-severity” security patch is included in this version. This upgrade will roll out over the next days and weeks.
For the Stable channel, Google stated that it will begin distributing weekly security upgrades. This should also aid in resolving a patch gap in the Chrome release cycle.
Updates to address security and other high-impact vulnerabilities will be scheduled weekly instead of every four weeks to implement security fixes more quickly.
When a security flaw in Chrome is resolved, the updated source code for Chromium is made available to the general public. After testing and evaluation, the patch is released to the Stable Channel.
High- Severity Vulnerability Patched
A high severity flaw tracked as CVE-2023-4572, Use after free in MediaStream has been fixed. The issue was reported by fwnfwn(@_fwnfwn).
When dynamic memory is used improperly while a program is running, it can lead to a vulnerability known as Use After Free (UAF). An attacker might exploit the error to manipulate the program if a program doesn’t delete the pointer to a memory location after freeing it.
Chrome for Linux and macOS: Chrome 116.0.5845.140
Chrome for Windows: Chrome 116.0.5845.140 or Chrome 116.0.5845.141
How to Update Google Chrome
To guard the system and browser against issues, it is advised that the update be applied as soon as possible.
Keep informed about the latest Cyber Security News by following us on Google News, Linkedin, Twitter, and Facebook.
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. …
INTERPOL has called for the term "romance baiting" to replace "pig butchering," a phrase widely…
Cybersecurity experts are sounding the alarm over a new strain of malware dubbed "I2PRAT," which…
A new cyber campaign by the advanced persistent threat (APT) group Earth Koshchei has brought…
Recent research has linked a series of cyberattacks to The Mask group, as one notable…
RiseLoader, a new malware family discovered in October 2024, leverages a custom TCP-based binary protocol…