[go: up one dir, main page]

Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

Google Chrome Gets 6 Security Fixes to Patch High-Severity Vulnerabilities

External researchers find bugs in Chrome's desktop version that could be exploited. Google is pushing fixes for Windows, Mac, and Linux Chrome users.

May 22, 2024
Google Chrome browser homepage open on a laptop screen, showing text "What's New in Chrome." (Credit: Tada Images/Shutterstock.com)

Google is rolling out Chrome updates for desktop users to address six security issues, four of which were found by external researchers and rated high-severity vulnerabilities.

The issues include a "user after free" vulnerability CVE-2024-5157, a "type confusion" flaw CVE-2024-5158, and two "heap buffer overflow" issues. Use-after-free vulnerabilities are memory corruption issues that could be exploited by threat actors if left unpatched. Type confusion bugs have been found before in Chromium-based based browsers, and exist in the V8 Javascript engine. Attackers could exploit a type confusion bug by triggering the bug with an HTML page, cybersecurity firm SocRadar explained in a post last year.

One of the heap buffer overflow issues, CVE-2024-5159, was found in Chrome's graphics layer engine Angle. The other, CVE-2024-5160, was found in Dawn, Google's WebGPU standard.

The four security vulnerabilities were reported within the past five weeks. Google has already rewarded three of the external researchers so far for their findings, giving out $26,000 in total.

Windows and Mac users will get the fixes in the 125.0.6422.76/.77 versions of Chrome, while Linux users will see the fixes reflected in the 125.0.6422.76 Chrome version. Google says these new Chrome versions will be released in "the coming days/weeks." SecurityWeek first reported the news of Chrome's 125 latest update.

Earlier this month, Google released an emergency fix for another Chrome bug, CVE-2024-4671, which was also given a high-severity rating. This flaw was also a "use after free" bug, which could have been exploited to install malware, for example. Google said at the time it was aware that an exploit for the vulnerability "exists in the wild."

Get Our Best Stories!

Sign up for What's New Now to get our top stories delivered to your inbox every morning.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Kate Irwin

Reporter

I’m a reporter covering early morning news. Prior to joining PCMag in 2024, I was a reporter and producer at Decrypt and launched its gaming vertical, GG. I have previous bylines with Input, Game Rant, and Dot Esports. I’ve been a PC gamer since The Sims (yes, the original). In 2020, I finally built my first PC with a 3090 graphics card, but also regularly use Mac and iOS devices as well. As a reporter, I’m passionate about uncovering scoops and documenting the wide world of tech and how it affects our daily lives.

Read Kate's full bio

Read the latest from Kate Irwin