Google on Tuesday announced the release of 26 security patches as part of its latest Chrome update, including one for a critical-severity bug.
A total of 22 vulnerabilities addressed with the latest Chrome refresh were reported by external researchers, including one critical-severity, 16 high-severity, and five medium-severity issues.
There were 12 use-after-free bugs reported externally, impacting Safe Browsing, Site isolation, Web packaging, Omnibox, Printing, Vulkan, Scheduling, Text Input Method Editor, Bookmarks, Optimization Guide, and Data Transfer.
The most important of these security errors is CVE-2022-0289, a critical use-after-free flaw in Safe Browsing that could be exploited to achieve arbitrary code execution. The bug was found by Sergei Glazunov of Google Project Zero.
Glazunov also identified two high-severity vulnerabilities in Chrome, including a use-after-free issue in “Site isolation” that is tracked as CVE-2022-0290 (the same bug was also discovered by Brendon Tiszka) and a heap buffer overflow flaw in PDFium, tracked as CVE-2022-0306.
The remaining high-severity vulnerabilities include eight use-after-free bugs, four inappropriate implementation issues, a heap buffer overflow, and a race condition.
The five medium-severity security defects fixed with the latest Chrome 97 release include two use-after-free issues, one inappropriate implementation bug, and two heap buffer overflow vulnerabilities.
Google says it has paid out $108,000 in bug bounty rewards to the reporting researchers to date, but the Internet giant has yet to determine the reward amounts for nine of the patched vulnerabilities.
The latest Chrome release is now rolling out to desktop users (Windows, macOS, and Linux) as version 97.0.4692.99.
Related: Chrome 97 Patches 37 Vulnerabilities
Related: Google Patches Serious Use-After-Free Vulnerabilities in Chrome
Related: Chrome 96 Update Patches Exploited Zero-Day Vulnerability

More from Ionut Arghire
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
