Chrome 101.0.4951.41 for Windows, Mac, and Linux includes several improvements for severe security flaws. Google paid out a total of $29,000 for four of the top six more critical vulnerabilities. The other two are discovered inside. These include the following.
- CVE-2022-1477: Use after free in Vulkan.
- CVE-2022-1478: Use after free in SwiftShader.
- CVE-2022-1479: Use after free in ANGLE.
- CVE-2022-1481: Use after free in Sharing.
- CVE-2022-1482: Inappropriate implementation in WebGL.
- CVE-2022-1483: Heap buffer overflow in WebGPU.
Google did not disclose details on these vulnerabilities. It said it wanted to wait until the majority of users have updated their browsers before reporting exactly what these flaws are and how attackers might exploit them. It is also putting down any information on vulnerabilities that exist in third-party libraries until developers have the possibility to patch them.
Google branded the remaining 23 fixes as mainly medium threats, with four listed low. The following is the second major release in a row, which Google has urgently encouraged users to migrate to due to security concerns.
Users may update manually from Chrome settings or perform a new update from our mirror. Alternatively, people may wait, and the browser will update automatically in a few days.