Google fixes several high severity vulnerabilities in its Chrome 105.0.5195.125/126/127 Stable Channel update
Hello everyone,
Chrome Stable Channel has been updated to 105.0.5195.127 for Windows, and 105.0.5195.125 for Mac, and Linux. This update comes with 11 security fixes. The details of the vulnerabilities fixed are mentioned below:
CVE ID | Vulnerability | Severity |
CVE-2022-3195 | Out of bounds write in Storage | High |
CVE-2022-3196 | Use after free in PDF | High |
CVE-2022-3197 | Use after free in PDF | High |
CVE-2022-3198 | Use after free in PDF | High |
CVE-2022-3199 | Use after free in Frames | High |
CVE-2022-3200 | Heap buffer overflow in Internals | High |
CVE-2022-3201 | Insufficient validation of untrusted input in DevTools | High |
To install this update on your Windows / Mac machines, initiate a sync between the Central Patch Repository and the Endpoint Central / Patch Manager Plus / Vulnerability Manager Plus server. Once the sync is complete, search for the following Patch IDs or Bulletin ID and deploy them to your target systems.
Patch ID | Bulletin ID | Patch Description |
326595 | TU-017 | Google Chrome (x64) (105.0.5195.127) |
326594 | TU-017 | Google Chrome (105.0.5195.127) |
604194 | MAC-012 | Google Chrome for Mac (105.0.5195.125) |
Cheers,
The ManageEngine Team
New to ADSelfService Plus?