Google has released Chrome 119 to the stable channel for Windows, Mac, and Linux, along with 15 security patches.
Version 119.0.6045.105 for Linux and macOS and version 119.0.6045.105/.106 for Windows are the most recent versions of Chrome currently available to users. Over the coming days and weeks, the update will be implemented. Google Report says.
High-Severity Vulnerabilities Addressed
A high-severity vulnerability related to inappropriate implementation of payments is tracked as CVE-2023-5480. Vsevolod Kokorin (Slonser) of Solidlab reported the issue, and Google paid a bounty of $15,000.
Next is the high-severity vulnerability in USB with insufficient data validation, identified as CVE-2023-5482. DarkNavy reported the issue, and a bounty of $11,000 was awarded.
This vulnerability, identified as CVE-2023-5849, is a high-severity USB integer overflow. DarkNavy first reported this; Google has not yet decided how much will be given out.
Medium and Low Severity Vulnerabilities Addressed
An incorrect security user interface (UI) in downloads is a medium-severity bug identified as CVE-2023-5850. Following Mohit Raj’s (shadow2639) report, a bounty of $3000 was granted.
Inappropriate implementation in downloads is a Medium-severity bug identified as CVE-2023-5851. Shaheen Fazim reported the problem and was awarded a $3000 prize.
The following vulnerability with a medium severity is CVE-2023-5852; use after free printing. $2000 was awarded when [pwn2car] reported it.
A medium-severity vulnerability, CVE-2023-5853, is related to an incorrect security user interface in downloads. Hafiizh reported this, and a bounty of $1,000 was given.
Use after free in profiles is a medium-severity flaw tagged as CVE-2023-5854. Dohyun Lee (@l33d0hyun) of SSD-Disclosure Labs & DNSLab, Korea University, reported it, and $1000 was given out.
CVE-2023-5855 is a medium-severity bug. Use after free in Reading Mode. ChaobinZhang reported it, and Google has not yet determined how much would be distributed.
CVE-2023-5856, “Use after free in Side Panel,” is the following medium-severity bug being fixed. Weipeng Jiang (@Krace) of VRI reported this, and Google has not yet determined how much will be released.
An issue of medium severity, inappropriate download implementation, is being tracked as CVE-2023-5857. Will Dormann reported on this.
An issue of low severity and inappropriate implementation in WebApp providers is being tracked as CVE-2023-5858. Axel Chong reported this, and $3000 was awarded.
Incorrect security UI in Picture In the picture is a low-severity bug tagged as CVE-2023-5859. $500 was awarded as a bounty after Junsung Lee reported this.
Patch Manager Plus, our all-around patching solution, offers automated patch deployment for Windows, macOS, and Linux endpoints, along with patching support for 950+ third-party updates across 850+ third party applications..
How Do I Update?
To view the most recent version on desktop devices, users of Google Chrome can navigate to Menu > Help > About Google Chrome or type chrome://settings/help into the address bar.
As soon as the website is accessed, the browser looks for updates; it downloads and installs any that it finds. It ought to detect and install Chrome 119. To finish the update, the browser must be restarted.
Google recommends users update the most recent version of Google Chrome to prevent exploiting vulnerabilities.
Protect vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a Free Trial to ensure 100% security.