Google fixes several high-severity vulnerabilities in Chrome 119.0.6045.199/.200 stable channel update
Good day, everyone!
Chrome Stable Channel has been updated to 119.0.6045.199/.200 for Windows, 119.0.6045.199 for Mac and Linux. This update comes with 7 security fixes. The details of the vulnerabilities fixed are mentioned below:
CVE ID | Vulnerability | Severity |
CVE-2023-6348 | Type Confusion in Spellcheck | High |
CVE-2023-6347 | Use after free in Mojo | High |
CVE-2023-6346 | Use after free in WebAudio | High |
CVE-2023-6350 | Out of bounds memory access in libavif | High |
CVE-2023-6351 | Use after free in libavif | High |
CVE-2023-6345 | Integer overflow in Skia | High |
To install these updates on your machines, initiate a sync between the Central Patch Repository and the Vulnerability Manager Plus server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.
Patch details:
Patch ID | Bulletin ID | Patch Description |
334582 | TU-017 | Google Chrome (x64) (119.0.6045.200) |
334581 | TU-017 | Google Chrome (119.0.6045.200) |
606253 | MAC-012 | Google Chrome For Mac 119.0.6045.199 |
Cheers,
The ManageEngine Team
New to ADSelfService Plus?