{"id":261213,"date":"2022-01-05T15:22:18","date_gmt":"2022-01-05T14:22:18","guid":{"rendered":"https:\/\/www.borncity.com\/blog\/?p=261213"},"modified":"2022-01-05T15:28:04","modified_gmt":"2022-01-05T14:28:04","slug":"chrome-97-0-4692-71-erschienen-enthlt-fixes-fr-37-sicherheitslcken","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2022\/01\/05\/chrome-97-0-4692-71-erschienen-enthlt-fixes-fr-37-sicherheitslcken\/","title":{"rendered":"Chrome 97.0.4692.71 erschienen, enth&auml;lt Fixes f&uuml;r 37 Sicherheitsl&uuml;cken"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Chrome-01.jpg\" \/>[<a href=\"https:\/\/borncity.com\/win\/2022\/01\/05\/chrome-97-0-4692-71-erschienen-enthlt-fixes-fr-37-sicherheitslcken\/\" target=\"_blank\" rel=\"noopener\">English<\/a>]Google hat zum 4. Januar 2022 ein Update des Google Chrome 97.0.4692.71 f\u00fcr Windows, Mac und Linux (und die Version 97.0.4664.104 f\u00fcr Android) freigegeben. Es ist ein Update auf einen neuen Entwicklungszweig, welches Schwachstellen schlie\u00dft. Hier ein kurzer \u00dcberblick.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg09.met.vgwort.de\/na\/b1d9a8ba07e4426e93abd83c110f6880\" alt=\"\" width=\"1\" height=\"1\" \/>Im <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">Google-Blog<\/a> gibt es <a href=\"https:\/\/chromereleases.googleblog.com\/2022\/01\/stable-channel-update-for-desktop.html\" target=\"_blank\" rel=\"noopener\">diesen Beitrag<\/a> mit der kurzen Beschreibung der im Chrome 97.0.4692.71 f\u00fcr den Desktop geschlossenen Schwachstellen.<\/p>\n<ul>\n<li>[$TBD][1275020] Critical CVE-2022-0096: Use after free in Storage. Reported by Yangkang (@dnpushme) of 360 ATA on 2021-11-30<\/li>\n<li>[$10000][1117173] High CVE-2022-0097: Inappropriate implementation in DevTools. Reported by David Erceg on 2020-08-17<\/li>\n<li>[$10000][1273609] High CVE-2022-0098: Use after free in Screen Capture. Reported by @ginggilBesel on 2021-11-24<\/li>\n<li>[$5000][1245629] High CVE-2022-0099: Use after free in Sign-in. Reported by Rox on 2021-09-01<\/li>\n<li>[$TBD][1238209] High CVE-2022-0100: Heap buffer overflow in Media streams API. Reported by Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2021-08-10<\/li>\n<li>[$TBD][1249426] High CVE-2022-0101: Heap buffer overflow in Bookmarks. Reported by raven (@raid_akame)\u00a0 on 2021-09-14<\/li>\n<li>[$TBD][1260129] High CVE-2022-0102: Type Confusion in V8 . Reported by Brendon Tiszka on 2021-10-14<\/li>\n<li>[$TBD][1272266] High CVE-2022-0103: Use after free in SwiftShader. Reported by Abraruddin Khan and Omair\u00a0 on 2021-11-21<\/li>\n<li>[$TBD][1273661] High CVE-2022-0104: Heap buffer overflow in ANGLE. Reported by Abraruddin Khan and Omair on 2021-11-25<\/li>\n<li>[$TBD][1274376] High CVE-2022-0105: Use after free in PDF. Reported by Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2021-11-28<\/li>\n<li>[$TBD][1278960] High CVE-2022-0106: Use after free in Autofill. Reported by Khalil Zhani on 2021-12-10<\/li>\n<li>[$10000][1248438] Medium CVE-2022-0107: Use after free in File Manager API. Reported by raven (@raid_akame)\u00a0 on 2021-09-10<\/li>\n<li>[$5000][1248444] Medium CVE-2022-0108: Inappropriate implementation in Navigation. Reported by Luan Herrera (@lbherrera_) on 2021-09-10<\/li>\n<li>[$4000][1261689] Medium CVE-2022-0109: Inappropriate implementation in Autofill. Reported by Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University on 2021-10-20<\/li>\n<li>[$3000][1237310] Medium CVE-2022-0110: Incorrect security UI in Autofill. Reported by Alesandro Ortiz on 2021-08-06<\/li>\n<li>[$3000][1241188] Medium CVE-2022-0111: Inappropriate implementation in Navigation. Reported by garygreen on 2021-08-18<\/li>\n<li>[$3000][1255713] Medium CVE-2022-0112: Incorrect security UI in Browser UI. Reported by Thomas Orlita\u00a0 on 2021-10-04<\/li>\n<li>[$1000][1039885] Medium CVE-2022-0113: Inappropriate implementation in Blink. Reported by Luan Herrera (@lbherrera_) on 2020-01-07<\/li>\n<li>[$TBD][1267627] Medium CVE-2022-0114: Out of bounds memory access in Web Serial. Reported by Looben Yang on 2021-11-06<\/li>\n<li>[$NA][1268903] Medium CVE-2022-0115: Uninitialized Use in File API. Reported by Mark Brand of Google Project Zero on 2021-11-10<\/li>\n<li>[$TBD][1272250] Medium CVE-2022-0116: Inappropriate implementation in Compositing. Reported by Irvan Kurniawan (sourc7) on 2021-11-20<\/li>\n<li>[$TBD][1115847] Low CVE-2022-0117: Policy bypass in Service Workers. Reported by Dongsung Kim (@kid1ng) on 2020-08-13<\/li>\n<li>[$TBD][1238631] Low CVE-2022-0118: Inappropriate implementation in WebShare. Reported by Alesandro Ortiz on 2021-08-11<\/li>\n<li>[$TBD][1262953] Low CVE-2022-0120: Inappropriate implementation in Passwords. Reported by CHAKRAVARTHI (Ruler96) on 2021-10-25<\/li>\n<\/ul>\n<p>Hinzu kommen verschiedene Fixes, die Google intern bei Audits gefunden hat. Details zun Schwachstellen werden aber keine ver\u00f6ffentlicht, bis der Gro\u00dfteil der Nutzer umgestiegen ist. Die Chrome-Version f\u00fcr Windows, Mac und Linux wird in den n\u00e4chsten Tagen \u00fcber die automatische Update-Funktion auf die Systeme ausgerollt. Die aktuelle Build des Chrome-Browsers l\u00e4sst sich auch <a href=\"https:\/\/www.google.com\/intl\/de_de\/chrome\/\" target=\"_blank\" rel=\"noopener\">hier herunterladen<\/a>. (<a href=\"https:\/\/www.deskmodder.de\/blog\/2022\/01\/05\/google-chrome-97-0-4692-71-korrigiert-37-sicherheitsluecken-zwei-davon-kritisch-und-weitere-aktualisierungen\/\" target=\"_blank\" rel=\"noopener\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Google hat zum 4. Januar 2022 ein Update des Google Chrome 97.0.4692.71 f\u00fcr Windows, Mac und Linux (und die Version 97.0.4664.104 f\u00fcr Android) freigegeben. Es ist ein Update auf einen neuen Entwicklungszweig, welches Schwachstellen schlie\u00dft. Hier ein kurzer \u00dcberblick.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1356,426,185],"tags":[406,4315],"class_list":["post-261213","post","type-post","status-publish","format-standard","hentry","category-google-chrome-internet","category-sicherheit","category-update","tag-chrome","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/261213","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=261213"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/261213\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=261213"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=261213"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=261213"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}