Blog

Google releases Chrome security update: 4 vulnerabilities fixed

Google releases an update to Chrome fixing 4 vulnerabilities, including 2 high-severity ones

Google has rolled out an update for the Chrome browser that addresses 4 security vulnerabilities, 2 of which have been classified as “high severity.” This update impacts all major platforms, including Windows, Mac, and Linux. Here’s what you need to know to keep your device secure.

Update details

Google recently made available a security update for the stable release of Google Chrome, addressing critical vulnerabilities that could compromise user safety. The identified vulnerabilities allow arbitrary code execution and have an estimated impact rating of HIGH/ORANGE (65.12/100). It’s crucial to update your browser to the latest version to prevent potential attacks.

Affected products and versions

The affected versions include:

  • Google Chrome on Windows and Mac: versions prior to 128.0.6613.119/.120
  • Google Chrome on Linux: versions prior to 128.0.6613.119

If your browser is running one of these versions, it is strongly advised to update immediately.

Vulnerability types

The vulnerabilities involve specific attack vectors, such as arbitrary code execution. Two of the most critical vulnerabilities include:

  • CVE-2024-8362: “Use after free” in WebAudio, reported by Cassidy Kim.
  • CVE-2024-7970: “Out of bounds write” in Chrome’s V8 engine.

Both of these vulnerabilities have been classified as “high severity,” meaning they could allow attackers to execute malicious code on the victim’s device.

Mitigation actions

To protect your devices, Google recommends updating Chrome to the latest available version:

  • Windows and Mac versions: 128.0.6613.120
  • Linux versions: 128.0.6613.119

The update will be rolled out over the coming days/weeks, but you can manually check for updates directly within your browser’s settings.

Online security is crucial, and keeping your software up to date is the best way to minimize risks. Check now if your browser is updated to avoid exposure to these vulnerabilities.

Share your thoughts on this security update and how you manage your device’s security by commenting in the form below!

Sign up for the newsletter. Stay updated!

We will send you periodical important communications and news about the digital world. You can unsubscribe at any time by clicking the appropriate link at the bottom of the newsletter.

Dopstart

Dopstart è il sito di Paolino Donato ma anche il suo Nickname su Internet. Dopstart è un consulente SEO. Si occupa di posizionamento nei motori di ricerca fin dal 1998. Dal 2010 ha collaborato con Google in qualità di TC per Google News italiano e Google Noticias per i Paesi di Lingua spagnola e dal 2018 come Product Expert vedi curriculum

Share
Published by
Dopstart

Recent Posts

Competitor analysis in digital marketing

Understanding your rivals is key. This article explores the importance of competitor analysis in digital…

5 days ago

Connecting Blogger to Google Search Console

Google Search Console is an essential tool for monitoring and optimizing your site's visibility in…

3 weeks ago

SEO for Blogger: complete guide

Our SEO Agency rarely has requests to optimize sites made with Google Blogger. However, it…

4 weeks ago

Domain Problem Blogger Godaddy Without www

We have received several reports of problems with the Godaddy domain connected to Blogger. In…

4 weeks ago

Blocking the Semrush Bot: Why and How to Do It

A client of ours to whom we provide SEO services has specifically asked to use…

1 month ago

Typosquatting: what it is and how to prevent

Abstract Typosquatting is a pervasive threat in the digital landscape, exploiting simple errori di ortografia…

1 month ago