{"id":21353,"date":"2021-09-14T01:12:54","date_gmt":"2021-09-13T23:12:54","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=21353"},"modified":"2021-09-14T01:12:54","modified_gmt":"2021-09-13T23:12:54","slug":"chrome-93-0-4577-82-sicherheitsupdate","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2021\/09\/14\/chrome-93-0-4577-82-sicherheitsupdate\/","title":{"rendered":"Chrome 93.0.4577.82"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Chrome-01.jpg\">[<a href=\"https:\/\/www.borncity.com\/blog\/2021\/09\/14\/chrome-93-0-4577-82-sicherheitsupdate\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Google has released the stable version of Google Chrome 93.0.4577.82 for Windows, Mac and Linux on September 13, 2021. It is a security update that closes 0-day vulnerabilities. Some vulnerabilities are already being exploited. Here's a brief overview of what to expect from the update.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg07.met.vgwort.de\/na\/4dd7f347800847feb556e19b5d875bd5\" width=\"1\" height=\"1\">The&nbsp; <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">Google blog<\/a>&nbsp; has <a href=\"https:\/\/chromereleases.googleblog.com\/2021\/09\/stable-channel-update-for-desktop.html\" target=\"_blank\" rel=\"noopener\">this post<\/a> with a list of the 11 vulnerabilities closed in Chrome 93.0.4577.82 for the desktop. Here are some highlighted vulnerabilities that have been fixed.  <\/p>\n<ul>\n<li>[$7500][1237533] High CVE-2021-30625: Use after free in Selection API. Reported by Marcin Towalski of Cisco Talos on 2021-08-06\n<li>[$7500][1241036] High CVE-2021-30626: Out of bounds memory access in ANGLE. Reported by Jeonghoon Shin of Theori on 2021-08-18\n<li>[$5000][1245786] High CVE-2021-30627: Type Confusion in Blink layout. Reported by Aki Helin of OUSPG on 2021-09-01\n<li>[$TBD][1241123] High CVE-2021-30628: Stack buffer overflow in ANGLE. Reported by Jaehun Jeong(@n3sk) of Theori on 2021-08-18\n<li>[$TBD][1243646] High CVE-2021-30629: Use after free in Permissions. Reported by Weipeng Jiang (@Krace) from Codesafe Team of Legendsec at Qi'anxin Group on 2021-08-26\n<li>[$TBD][1244568] High CVE-2021-30630: Inappropriate implementation in Blink . Reported by SorryMybad (@S0rryMybad) of Kunlun Lab on 2021-08-30\n<li>[$TBD][1246932] High CVE-2021-30631: Type Confusion in Blink layout. Reported by Atte Kettunen of OUSPG on 2021-09-06\n<li>[$TBD][1247763] High CVE-2021-30632: Out of bounds write in V8. Reported by Anonymous on 2021-09-08\n<li>[$TBD][1247766] High CVE-2021-30633: Use after free in Indexed DB API. Reported by Anonymous on 2021-09-08<\/li>\n<\/ul>\n<p>Other issues have been tracked down and fixed internally through audits and fuzzing. Google is aware that exploits for CVE-2021-30632 and CVE-2021-30633 exist in the wild. The Chrome build for Windows, Mac and Linux will be rolled out to systems via the automatic update feature over the next few days.&nbsp; The latest build of the Chrome browser can also be downloaded <a href=\"https:\/\/www.google.com\/intl\/de_de\/chrome\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Google has released the stable version of Google Chrome 93.0.4577.82 for Windows, Mac and Linux on September 13, 2021. It is a security update that closes 0-day vulnerabilities. Some vulnerabilities are already being exploited. Here's a brief overview of what &hellip; <a href=\"https:\/\/borncity.com\/win\/2021\/09\/14\/chrome-93-0-4577-82-sicherheitsupdate\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[872,580,1547,22],"tags":[780],"class_list":["post-21353","post","type-post","status-publish","format-standard","hentry","category-browser","category-security","category-software","category-update","tag-chrome"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=21353"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/21353\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=21353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=21353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=21353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}