Blog

Google releases Chrome security update: 4 vulnerabilities fixed

Google releases an update to Chrome fixing 4 vulnerabilities, including 2 high-severity ones

Google has rolled out an update for the Chrome browser that addresses 4 security vulnerabilities, 2 of which have been classified as “high severity.” This update impacts all major platforms, including Windows, Mac, and Linux. Here’s what you need to know to keep your device secure.

Update details

Google recently made available a security update for the stable release of Google Chrome, addressing critical vulnerabilities that could compromise user safety. The identified vulnerabilities allow arbitrary code execution and have an estimated impact rating of HIGH/ORANGE (65.12/100). It’s crucial to update your browser to the latest version to prevent potential attacks.

Affected products and versions

The affected versions include:

  • Google Chrome on Windows and Mac: versions prior to 128.0.6613.119/.120
  • Google Chrome on Linux: versions prior to 128.0.6613.119

If your browser is running one of these versions, it is strongly advised to update immediately.

Vulnerability types

The vulnerabilities involve specific attack vectors, such as arbitrary code execution. Two of the most critical vulnerabilities include:

  • CVE-2024-8362: “Use after free” in WebAudio, reported by Cassidy Kim.
  • CVE-2024-7970: “Out of bounds write” in Chrome’s V8 engine.

Both of these vulnerabilities have been classified as “high severity,” meaning they could allow attackers to execute malicious code on the victim’s device.

Mitigation actions

To protect your devices, Google recommends updating Chrome to the latest available version:

  • Windows and Mac versions: 128.0.6613.120
  • Linux versions: 128.0.6613.119

The update will be rolled out over the coming days/weeks, but you can manually check for updates directly within your browser’s settings.

Online security is crucial, and keeping your software up to date is the best way to minimize risks. Check now if your browser is updated to avoid exposure to these vulnerabilities.

Share your thoughts on this security update and how you manage your device’s security by commenting in the form below!

Sign up for the newsletter. Stay updated!

We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.

Dopstart

Dopstart è il sito di Paolino Donato ma anche il suo Nickname su Internet. Dopstart è un consulente SEO. Si occupa di posizionamento nei motori di ricerca fin dal 1998. Dal 2010 ha collaborato con Google in qualità di TC per Google News italiano e Google Noticias per i Paesi di Lingua spagnola e dal 2018 come Product Expert vedi curriculum

Share
Published by
Dopstart

Recent Posts

Gmail scam alert: fake tech support trick is stealing your recovery codes

Phishing emails and fake Google calls are compromising accounts—here’s how the scam works and how…

6 days ago

APT41: when espionage becomes business

The Chinese hacker group turning every vulnerability into an attack opportunity In the vast ecosystem…

2 weeks ago

The file wp-config.php already exists? Clear Aruba cache

When WordPress works… but only on your computer You’ve just installed WordPress on a brand new domain.…

1 month ago

UI Design: cos’è e come si fa?

In this article, we’ll explore what User Interface Design (UI Design) is, why it’s crucial…

1 month ago

How ChatGPT is rewriting digital marketing rules

With generative AI on the rise, winning mentions is now the key to online brand…

1 month ago

Google revamps AdSense: auto optimization now customizable per site

The latest update from Mountain View gives publishers greater control over advertising experiments and a…

1 month ago