Tuesday, November 12, 2024
HomeChromeChrome Security Update, 17 Vulnerabilities Patched

Chrome Security Update, 17 Vulnerabilities Patched

Published on

Malware protection

Google has announced a significant security update for its Chrome browser, addressing 17 vulnerabilities in the latest build.

The update, which affects the Stable and Extended Stable channels, will roll out over the coming days and weeks for Windows, Mac, and Linux users.

Update Details

The Stable channel has been updated to versions 130.0.6723.58/.59 for Windows and Mac and 130.0.6723.58 for Linux.

- Advertisement - SIEM as a Service

Meanwhile, the Extended Stable channel has been updated to version 130.0.6723.59 for Windows and Mac. These updates are part of Google’s ongoing efforts to enhance browser security and protect users from threats.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

Security Fixes and Rewards

In this update, Google has patched 17 security vulnerabilities, with several fixes contributed by external researchers.

The company has awarded $66,000 in rewards to those who reported these issues. The table below summarizes the key vulnerabilities patched:

SeverityCVE IDDescriptionReward
HighCVE-2024-9954Use after free in AI$36,000
MediumCVE-2024-9955Use after free in Web Authentication$6,000
MediumCVE-2024-9956Inappropriate implementation in Web Auth$6,000
MediumCVE-2024-9957Use after free in UI$5,000
MediumCVE-2024-9958Inappropriate implementation in PictureInPicture$5,000
MediumCVE-2024-9959Use after free in DevTools$4,000
MediumCVE-2024-9960Use after free in Dawn$2,000
MediumCVE-2024-9961Use after free in Parcel Tracking$2,000
MediumCVE-2024-9962Inappropriate implementation in Permissions$1,000
MediumCVE-2024-9963Insufficient data validation in DownloadsTBD
LowCVE-2024-9964Inappropriate implementation in Payments$3,000
LowCVE-2024-9965Insufficient data validation in DevTools$1,000
LowCVE-2024-9966Inappropriate implementation in Navigations$1,000

Google continues to emphasize its commitment to security through internal audits and collaborations with external researchers.

The company utilizes tools such as AddressSanitizer and MemorySanitizer to detect vulnerabilities proactively.

Access to detailed bug information remains restricted until most users have applied the update to ensure comprehensive protection.

How to Choose an ultimate Managed SIEM solution for Your Security Team -> Download Free Guide(PDF)

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Tor Network Suffers IP Spoofing Attack Via Non-Exit Relays

In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting...