Google launched a brand new model of its Chrome net browser to the general public. The brand new model of the net browser, Chrome 97.0.4692.99, is a safety replace that addresses 26 completely different points within the browser, together with one rated important. Chrome Prolonged Steady has been up to date as nicely to handle the problems.
The Prolonged Steady is up to date to a brand new milestone launch each 8 weeks. It’s designed for organizations and Enterprise prospects primarily, however obtainable for everybody.
Chrome 97.0.4692.99 and Chrome 96.0.4664.174 are already obtainable. Google rolls out new variations over the course of days and weeks, utilizing Chrome’s automated updating performance for it.
Chrome customers who need the updates early can run handbook checks for updates. All it takes is to pick out Menu > Assist > About Google Chrome to begin the method. Chrome shows the present model and runs a examine for updates. The browser ought to decide up the brand new model through the scan to obtain and set up it. A restart is required to finish the method.
Weblog posts on the Chrome Releases weblog record all externally reported safety points that Google addressed within the Chrome replace. One vulnerability, CVE-2022-0289, is rated important, the very best severity score.
[$NA] Crucial CVE-2022-0289: Use after free in Protected shopping. Reported by Sergei Glazunov of Google Mission Zero on 2022-01-05
[$20000],[NA] Excessive CVE-2022-0290: Use after free in Web site isolation. Reported by Brendon Tiszka and Sergei Glazunov of Google Mission Zero on 2021-10-15
[$20000] Excessive CVE-2022-0291: Inappropriate implementation in Storage. Reported by Nameless on 2021-12-19
[$17000] Excessive CVE-2022-0292: Inappropriate implementation in Fenced Frames. Reported by Brendon Tiszka on 2021-11-16
[$15000] Excessive CVE-2022-0293: Use after free in Net packaging. Reported by Rong Jian and Guang Gong of 360 Alpha Lab on 2021-12-30
[$10000] Excessive CVE-2022-0294: Inappropriate implementation in Push messaging. Reported by Rong Jian and Guang Gong of 360 Alpha Lab on 2021-11-23
[$10000] Excessive CVE-2022-0295: Use after free in Omnibox. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Analysis Institute on 2021-12-09
[$7000] Excessive CVE-2022-0296: Use after free in Printing. Reported by koocola(@alo_cook) and Guang Gong of 360 Vulnerability Analysis Institute on 2021-12-30
[$5000] Excessive CVE-2022-0297: Use after free in Vulkan. Reported by Cassidy Kim of Amber Safety Lab, OPPO Cellular Telecommunications Corp. Ltd. on 2021-11-28
[$TBD] Excessive CVE-2022-0298: Use after free in Scheduling. Reported by Yangkang (@dnpushme) of 360 ATA on 2021-05-25
[$TBD] Excessive CVE-2022-0300: Use after free in Textual content Enter Methodology Editor. Reported by Rong Jian and Guang Gong of 360 Alpha Lab on 2021-12-01
[$NA] Excessive CVE-2022-0301: Heap buffer overflow in DevTools. Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability Analysis on 2021-12-03
[$TBD] Excessive CVE-2022-0302: Use after free in Omnibox. Reported by Weipeng Jiang (@Krace) and Guang Gong of 360 Vulnerability Analysis Institute on 2021-12-10
[$TBD] Excessive CVE-2022-0303: Race in GPU Watchdog. Reported by Yi?it Can YILMAZ (@yilmazcanyigit) on 2021-12-22
[$TBD] Excessive CVE-2022-0304: Use after free in Bookmarks. Reported by Rong Jian and Guang Gong of 360 Alpha Lab on 2021-12-22
[$TBD] Excessive CVE-2022-0305: Inappropriate implementation in Service Employee API. Reported by @uwu7586 on 2021-12-23
[$NA] Excessive CVE-2022-0306: Heap buffer overflow in PDFium. Reported by Sergei Glazunov of Google Mission Zero on 2021-12-29
[$2000] Medium CVE-2022-0307: Use after free in Optimization Information. Reported by Samet Bekmezci @sametbekmezci on 2021-12-21
[$2000] Medium CVE-2022-0308: Use after free in Knowledge Switch. Reported by @ginggilBesel on 2021-12-24
[$TBD] Medium CVE-2022-0309: Inappropriate implementation in Autofill. Reported by Alesandro Ortiz on 2021-08-17
[$TBD] Medium CVE-2022-0310: Heap buffer overflow in Activity Supervisor. Reported by Samet Bekmezci @sametbekmezci on 2022-01-03
[$TBD] Medium CVE-2022-0311: Heap buffer overflow in Activity Supervisor. Reported by Samet Bekmezci @sametbekmezci on 2022-01-03
Google doesn’t appear to pay attention to assaults focusing on any of the vulnerabilities, because it often reveals if that’s the case within the weblog posts on the Chrome Releases weblog.
You may take a look at the Steady and Prolonged Channel bulletins by following the hyperlinks.
Now You: when do you replace your browsers?