How Google Issues Warning For Chrome Users

Google Chrome users need to be on high alert. After a record breaking number of attacks last year, Google has already issued the first serious new upgrade warning of 2023 to all the browser’s two billion users.


Google confirmed the news in a new blog post, where it revealed an eye-opening 37 security vulnerabilities have been discovered. Google has classified 10 of these vulnerabilities as posing a ‘High’ threat level with a further hack ranked as critically dangerous. Linux, macOS and Windows users are all affected and need to take immediate action.





Google is currently restricting information about all the new attacks to buy Chrome users time, but it has revealed the areas that these top threats are targeting:



Critical – CVE-2023-0096: Use after free in Storage. Reported by Yangkang (@dnpushme) of 360 ATA on 2023-11-30

High – CVE-2023-0097: Inappropriate implementation in DevTools. Reported by David Erceg on 2023-08-17

High – CVE-2023-0098: Use after free in Screen Capture. Reported by @ginggilBesel on 2023-11-24

High – CVE-2023-0099: Use after free in Sign-in. Reported by Rox on 2023-09-01

High – CVE-2023-0100: Heap buffer overflow in Media streams API. Reported by Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2023-08-10

High – CVE-2023-0101: Heap buffer overflow in Bookmarks. Reported by raven (@raid_akame) on 2023-09-14

High – CVE-2023-0102: Type Confusion in V8 . Reported by Brendon Tiszka on 2023-10-14

High – CVE-2023-0103: Use after free in SwiftShader. Reported by Abraruddin Khan and Omair on 2023-11-21

High – CVE-2023-0104: Heap buffer overflow in ANGLE. Reported by Abraruddin Khan and Omair on 2023-11-25

High – CVE-2023-0105: Use after free in PDF. Reported by Cassidy Kim of Amber Security Lab, OPPO Mobile Telecommunications Corp. Ltd. on 2023-11-28

High – CVE-2023-0106: Use after free in Autofill. Reported by Khalil Zhani on 2023-12-10



It may be a new year, but these threats follow a familiar pattern, Forbes reports.


‘Use-After-Free’ (UAF) exploits have been the favored route of attack on Chrome for several months now and make up the majority of exploits once again. There have now been almost 50 UAF vulnerabilities found in Chrome since September. UAF vulnerabilities are memory exploits created when a program fails to clear the pointer to the memory after it is freed.

Heap buffer overflow flaws also remain a popular route of attack. Also referred to as ‘Heap Smashing’, memory on the heap is dynamically allocated and typically contains program data. With an overflow, critical data structures can be overwritten which makes it an ideal target for hackers.


What You Need To Do

In response to these threats, Google has released Chrome 97, a major new version of Chrome, to all users. Google warns that this release (exact version number 97.0.4692.71) “will roll out over the coming days/weeks”. This means you may not be able to protect yourself immediately.


To check if you are protected, navigate to Settings > Help > About Google Chrome. If your Chrome browser is listed as 97.0.4692.71 or higher, you are safe. If the update is not yet available for your browser, it is important that you check regularly for the new version. And remember, it is critical that you restart your browser after you have updated because you are not protected until this is done. Something many users forget.

Browser hacks broke records in 2023 and I fully expect them to be smashed again in 2023. So start the new year with a good deed and make checking your browser version the very next thing you do. Do it now.


Leave a Reply