Новости компьютерной безопасности:

  Latest News

Google Chrome 127 Released With Fix for Vulnerabilities that Lead to Browser Crash

С сайта: Vulnerability(cybersecuritynews.com)

Google Chrome 127 Released With Fix for Vulnerabilities that Lead to Browser Crash

Author: Guru Baran

Google has announced the release of Chrome 127, which is now available on the Stable channel for Windows, Mac, and Linux.

The new version, 127.0.6533.72/73 for Windows and Mac and 127.0.6533.72 for Linux, will be rolled out over the coming days and weeks. This update addresses multiple security vulnerabilities, including several high-risk issues that could lead to browser crashes.

Security Fixes and Rewards
The latest update includes 24 security fixes, with significant contributions from external researchers. While access to specific bug details and links may be restricted until a majority of users have updated, Google has highlighted several key fixes:

  • CVE-2024-6988 : Use after free in Downloads, reported by lime(@limeSec_) from TIANGONG Team of Legendsec at QI-ANXIN Group, with a reward of $11,000.
  • CVE-2024-6989 : Use after free in Loader, reported by an anonymous researcher, rewarded $8,000.
  • CVE-2024-6991 : Use after free in Dawn, reported by wgslfuzz.
  • CVE-2024-6992 : Out of bounds memory access in ANGLE, reported by Xiantong Hou of Wuheng Lab and Pisanbao.
  • CVE-2024-6993 : Inappropriate implementation in Canvas, reported by an anonymous researcher.
  • CVE-2024-6994 : Heap buffer overflow in Layout, reported by Huang Xilin of Ant Group Light-Year Security Lab, rewarded $8,000.
  • CVE-2024-6995 : Inappropriate implementation in Fullscreen, reported by Alesandro Ortiz, rewarded $6,000.
  • CVE-2024-6996 : Race in Frames, reported by Louis Jannett (Ruhr University Bochum), rewarded $5,000.
  • CVE-2024-6997 : Use after free in Tabs, reported by Sven Dysthe (@svn-dys), rewarded $3,000.
  • CVE-2024-6998 : Use after free in User Education, reported by Sven Dysthe (@svn-dys), rewarded $2,000.
  • CVE-2024-6999 : Inappropriate implementation in FedCM, reported by Alesandro Ortiz, rewarded $2,000.
  • CVE-2024-7000 : Use after free in CSS, reported by an anonymous researcher, rewarded $500.
  • CVE-2024-7001 : Inappropriate implementation in HTML, reported by Jake Archibald.

These high-severity vulnerabilities could allow attackers to execute arbitrary code, cause browser crashes, or gain unauthorized access to sensitive information.

Additionally, several other vulnerabilities were addressed, ranging from medium to low severity, and the reporting researchers were rewarded accordingly.

Google’s internal security efforts also contributed to this release, with various fixes stemming from internal audits, fuzzing, and other initiatives. Tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL played crucial roles in identifying and mitigating these security issues.

Users are strongly encouraged to update their Chrome browsers to the latest version to benefit from these critical security fixes. Keeping the browser updated enhances security and ensures improved stability and performance.

Users can refer to the Chrome Security Page and the official release notes for more detailed information on the changes and security fixes included in this release.

As always, users who encounter any new issues with Chrome 127 are encouraged to report them through Google’s bug reporting system or seek assistance through the community help forum.

To check if your Chrome browser is updated to version 127, you can follow these steps:

  1. Open Google Chrome on your device.
  2. Click on the three-dot menu icon in the top-right corner of the browser window.
  3. From the dropdown menu, select “Help” and then click on “About Google Chrome”.
  4. A new tab will open showing your current Chrome version. If you’re on version 127, it will be displayed here.
  5. Chrome will automatically check for updates when you’re on this page. If an update is available, it will download and install automatically.
  6. After the update is complete, you may need to click “Relaunch” to apply the changes.

For specific devices:

  • On Android: Open Chrome, tap the three-dot menu, go to Settings > About Chrome > Application version.
  • On iOS: Open Chrome, tap the three-dot menu, go to Settings > Google Chrome to see the version number.
  • On Windows/Mac: The process is the same as described in steps 1-4 above.

Alternatively, you can type “chrome://version” in the Chrome address bar on any platform to see detailed version information.



#Cyber_Security_News #Vulnerability #chrome #cyber_security #cyber_security_news #vulnerability

Оригинальная версия на сайте: Google Chrome 127 Released With Fix for Vulnerabilities that Lead to Browser Crash
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.