Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Google Chrome Users at Risk: CERT-In Advises Urgent Update to Fix Security Flaws

    Google Chrome Users at Risk: CERT-In Advises Urgent Update to Fix Security Flaws

    November 12, 2024

    vulnerabilities in Google Chrome

    The Indian Computer Emergency Response Team (CERT-In) has issued a warning about newly discovered vulnerabilities in Google Chrome that could pose significant risks to users.  

    These vulnerabilities, identified as CVE-2024-10826 and CVE-2024-10827, stem from a critical “use-after-free” issue in Chrome’s code, affecting versions of the browser across multiple operating systems.  

    The flaws, if exploited, could allow cybercriminals to execute arbitrary code, compromise sensitive data, or cause system crashes. 

    Overview of the Vulnerabilities in Google Chrome 

    The vulnerabilities, both classified as high severity, were officially reported in a CERT-In Vulnerability Note (CIVN-2024-0334) on November 8, 2024. They affect Google Chrome versions prior to 130.0.6723.116 for Linux, and versions before 130.0.6723.116/117 for Windows and macOS. The issues are linked to a use-after-free condition found in two specific components of the browser: Family Experiences and Serial. 

    The term use-after-free refers to a flaw in the software where a program continues to use memory that has already been freed or deallocated. This can result in unexpected behavior, including the execution of malicious code or a system crash. In this case, attackers could exploit these vulnerabilities by tricking users into visiting specially crafted websites, thereby triggering the flaw and taking control of the affected system. 

    The Risks of Exploiting These Google Chrome Vulnerabilities 

    The successful exploitation of the vulnerabilities in Google Chrome could lead to severe consequences for users. Among the potential risks are: 

    1. Arbitrary Code Execution: An attacker could run malicious code on the victim’s machine, gaining unauthorized access to sensitive data or enabling the installation of malware. 
    2. Denial of Service (DoS): A remote attacker could cause the browser or even the entire system to crash, disrupting the victim’s activities. 
    3. Data Theft: With the ability to execute arbitrary code, attackers could gain access to personal information, login credentials, and other sensitive data stored in the browser. 
    4. System Instability: The vulnerabilities could cause browser instability or system crashes, leading to downtime and potential data loss. 

    Details of the Affected Components 

    The two identified vulnerabilities—CVE-2024-10826 and CVE-2024-10827—are associated with the Family Experiences and Serial components of Google Chrome: 

    • CVE-2024-10826: This flaw affects the Family Experiences feature of Chrome, a component designed to help users manage family and child accounts. The vulnerability could allow attackers to exploit the flaw and execute arbitrary code on the victim’s device. This issue was reported by an anonymous security researcher on September 29, 2024. 
    • CVE-2024-10827: The second vulnerability, which affects the Serial component of the browser, was reported on October 23, 2024. This component handles communication with serial devices, and a use-after-free condition in this area could similarly lead to the execution of malicious code or system instability. 

    Both vulnerabilities were considered high-risk due to their potential to allow remote attackers to take control of the affected systems. 

    The Fix: Google Chrome Security Update 

    Google has already rolled out an update to address these vulnerabilities. Users are strongly advised to upgrade to the latest stable version of Google Chrome to protect against these security risks. The update, version 130.0.6723.116/117, is available for Windows, macOS, and Linux systems. Specifically, users on Linux should update to 130.0.6723.116, while users on Windows and macOS should upgrade to 130.0.6723.116 or 130.0.6723.117, depending on their system. 

    The official Google Chrome blog confirmed the update on November 5, 2024, announcing that the Stable Channel for Chrome had been updated, with the new version rolling out gradually over the following days. It also mentioned that the Extended Stable Channel was updated to version 130.0.6723.117 for Windows and macOS. 

    Google has thanked the external security researchers who contributed to identifying and reporting these vulnerabilities. In particular, the company highlighted the work done by an anonymous researcher who reported CVE-2024-10826 in September and another anonymous researcher who reported CVE-2024-10827 in October. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCyble and Digit Solutions Join Forces to Tackle Cyber Threats Across Middle East and Africa
    Next Article New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 17, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-40906 – MongoDB BSON Serialization BSON::XS Multiple Vulnerabilities

    May 17, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    How I Speed Up My Old Laptop Without Upgrading: A Complete Guide

    Artificial Intelligence

    New to the web platform in August

    Development

    How Untold Studios empowers artists with an AI assistant built on Amazon Bedrock

    Machine Learning

    Appium 1.4.13 How to resolve error: Could not detect Mac OS X Version from sw_vers output: ‘10.12 ‘]?

    Development

    Highlights

    Recreation of the GitHub mobile app header but for web using Trig.js

    March 18, 2025

    Comments Source: Read More 

    Harnessing the Power of SFMC Social Studio

    December 7, 2024

    Apple now sells refurbished iPhone 15 models at discounted prices (including the Pro Max)

    May 9, 2025

    studyFlash – learn flashcards in your terminal

    February 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.