Google fixes a critical and several high severity vulnerabilities in its Chrome 113.0.5672.126/.127 Stable Channel update
Hey everyone,
Chrome Stable Channel has been updated to 113.0.5672.126/.127 for Windows and 113.0.5672.126 for Mac and Linux. This update comes with 12 security fixes. The details of the vulnerabilities fixed are mentioned below:
CVE ID | Vulnerability | Severity |
CVE-2023-2721 | Use after free in Navigation | Critical |
CVE-2023-2722 | Use after free in Autofill UI | High |
CVE-2023-2723 | Use after free in DevTools | High |
CVE-2023-2724 | Type Confusion in V8 | High
|
CVE-2023-2725 | Use after free in Guest View | High |
CVE-2023-2726 | Inappropriate implementation in WebApp Installs | Medium |
To install this update on your Windows / Mac machines, initiate a sync between the Central Patch Repository and the Endpoint Central / Patch Manager Plus / Vulnerability Manager Plus server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.
Patch ID | Bulletin ID | Patch Description |
330683 | TU-017 | Google Chrome (x64) (113.0.5672.127) |
330682 | TU-017 | Google Chrome (113.0.5672.127) |
605202 | MAC-012 | Google Chrome For Mac 113.0.5672.127 |
Cheers,
The ManageEngine Team
New to ADSelfService Plus?