Google Chrome update – 92.0.4515.159

This content has been archived. But, the content is true and relevant to the underlying technology products or infrastructure services.

On 16th August, 2021, Google announced that it has brought out a new update to Google chrome browser for Windows, Linux and Mac desktops. The latest update will make the Google chrome stable release version 92.0.4515.159. The latest release seeks to address 7 vulnerabilities and security threats whose CVE tracking numbers are mentioned below. All these vulnerabilites had been report with HIGH impact for the user base.

List of vulnerabilities that will be fixed with the Google Chrome update to 92.0.4515.159 version:

  • CVE-2021-30598 – Type Confusion in V8. Reported by Manfred Paul on 2021-07-30
  • CVE-2021-30599 – Type Confusion in V8. Reported by Manfred Paul on 2021-07-30
  • CVE-2021-30600 – Use after free in Printing. Reported by Leecraso and Guang Gong of 360 Alpha Lab on 2021-07-20
  • CVE-2021-30601 – Use after free in Extensions API. Reported by koocola(@alo_cook) and Nan Wang(@eternalsakura13) of 360 Alpha Lab on 2021-07-28
  • CVE-2021-30602 – Use after free in WebRTC. Reported by Marcin Towalski of Cisco Talos  on 2021-07-19
  • CVE-2021-30603 – Race in WebAudio. Reported by Sergei Glazunov of Google Project Zero on 2021-07-27
  • CVE-2021-30604 – Use after free in ANGLE. Reported by Seong-Hwan Park (SeHwa) of SecunologyLab on 2021-07-30

Most details pertaining to these vulnerabilities are not published in the public domain as of now. This is done with an intent to prevent attacks and exploitation of these security loopholes.

Google chrome has been a subject of security attacks. These 7 high impact vulnerabilities on the Chrome browser have been detected during the month of July, and the Chrome engineering team has rolled out a stable release to patch these vulnerabilities on 16th August. We suggest that users should consider updating Google chrome on their desktop computers on a priority basis and protect their digital resources and identities from security incidents.

How useful was this post?

Click on a star to rate it!

We are sorry that this post was not useful for you!

Let us improve this post!

Tell us how we can improve this post?

Rajesh Dhawan

Rajesh Dhawan is a technology professional who loves to blog about smart wearables, Cloud computing and Microsoft technologies. He loves to break complex problems into manageable chunks of meaningful information.