To safeguard themselves against a critical issue that hackers are actively using against them, Google has encouraged users to update their Chrome browser’s security immediately. According to the business, assaults are already taking advantage of a new vulnerability that affects Chrome users on Windows, Mac, and Linux.
Only a few days have passed since Google released Chrome version 105 on August 30. “The Chrome team is happy to inform you that Chrome 105 has been moved to the stable channel for Windows, Mac, and Linux.
This will unfold over the ensuing days and weeks. There are several fixes and enhancements in Chrome versions 105.0.5195.52 for Mac/Linux and 105.0.5195.52/53/54 for Windows “In the release notice, Google stated.
Chrome version that is impacted
The tech giant acknowledged claims that an exploit for “CVE-2022-3075” was discovered in the wild. The vulnerability was identified as “Insufficient data validation in Mojo” and was disclosed by an unnamed security researcher. This is Chrome’s sixth zero-day vulnerability so far in 2018.
What users of Chrome should do
For the time being, Chrome users who want to apply the most recent security update must restart their browser. According to the business, a security patch has been released and will be made available to Google Chrome users using Windows, Mac, and Linux operating systems over the next few days/weeks.
In a security update, Google stated that the “Stable channel” for Windows, Mac, and Linux has been updated to 105.0.5195.102 and will be rolling out over the next few days/weeks.
The security update also states that access to bug information and links can be restricted until the majority of users have received the necessary updates.
The statement said, “We will also preserve limits if the flaw is in a third-party library that other projects similarly rely on but haven’t yet addressed.
The security experts who informed Google about the flaw were praised by the business. According to the corporation, “We would like to thank all security researchers who cooperated with us during the development cycle to prevent security flaws from ever reaching the stable channel.”