Hello everyone,
CVE ID | Vulnerability | Severity |
CVE-2022-1853 | Use after free in Indexed DB | Critical |
CVE-2022-1854 | Use after free in ANGLE | High |
CVE-2022-1855 | Use after free in Messaging | High |
CVE-2022-1856 | Use after free in User Education | High |
CVE-2022-1857 | Insufficient policy enforcement in File System API | High |
CVE-2022-1858 | Out of bounds read in DevTools | High |
CVE-2022-1859 | Use after free in Performance Manager | High |
CVE-2022-1860 | Use after free in UI Foundations | High |
CVE-2022-1861 | Use after free in Sharing | High |
CVE-2022-1862 | Inappropriate implementation in Extensions | Medium |
CVE-2022-1863 | Use after free in Tab Groups | Medium |
CVE-2022-1864 | Use after free in WebApp Installs | Medium |
CVE-2022-1865 | Use after free in Bookmarks | Medium |
CVE-2022-1866 | Use after free in Tablet Mode | Medium |
CVE-2022-1867 | Insufficient validation of untrusted input in Data Transfer | Medium |
CVE-2022-1868 | Inappropriate implementation in Extensions API | Medium |
CVE-2022-1869 | Type Confusion in V8 | Medium |
CVE-2022-1870 | Use after free in App Service | Medium |
To install this update on your Windows / Mac machines, initiate a sync between the Central Patch Repository and the Endpoint Central / Patch Manager Plus / Vulnerability Manager Plus server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.
Patch ID | Bulletin ID | Patch Description |
325013 | TU-017 | Google Chrome (x64) (102.0.5005.63) |
325012 | TU-017 | Google Chrome (102.0.5005.63) |
603851 | MAC-012 | Google Chrome for Mac 102.0.5005.61 |