⛔ Malicious actors are exploiting poorly secured Linux SSH servers. Secure your browsing experience and share this crucial update! 💻🛡️ #GoogleChrome #SecurityUpdate #CVE-2023-5217 #LinkedInCommunity ⚫ Chromium-based browser users (Microsoft Edge, Brave, Opera, Vivaldi) should install fixes as soon as they are available.Ģ️⃣ Click the three vertical dots at the top right.ģ️⃣ Select 'Help' and then 'About Google Chrome.'Ĥ️⃣ Click 'Update Google Chrome.' Note: If you can't find this button, you're already up-to-date.ĥ️⃣ Finally, click 'Relaunch' to ensure the update takes effect. ⚫ Users are strongly urged to update to Chrome version 1.132 on Windows, macOS, and Linux to mitigate potential risks. Such flaws can lead to software crashes or arbitrary code execution, impacting program availability and integrity.Ģ️⃣ CVE-2023-5186: A 'High severity' flaw known as 'Use after free in Passwords,' presenting significant risks.ģ️⃣ CVE-2023-5187: Another 'High severity' vulnerability labeled 'Use after free in Extensions.'
Google has identified an active exploit for CVE-2023-5217 and has swiftly released a vital update for Google Chrome across Windows, Mac, and Linux.Īdditional Fixes: Ten in total, including three rated as 'High severity'ġ️⃣ CVE-2023-5217: A 'High severity' Heap buffer overflow within the vp8 encoding functionality of the libvpx library.
🌐 Critical Chrome Update: CVE-2023-5217 Patched! 🌐