Google has released security updates for its Chrome browser for Windows, Mac and Linux, patching security holes that could allow a remote attacker to take control of systems”:

In total, the company released 11 fixes, including five that are classified as high-severity updates.
So CISA issued a warning encouraging system administrators as well as ordinary users to immediately install the updates to ensure that their systems are not vulnerable to the security holes.
Among the most serious vulnerabilities fixed by the Google Chrome update is CVE-2022-2477, a vulnerability caused by a use-after-free flaw in Guest View. This could allow a remote attacker to run arbitrary code in systems or drop them.
Another security vulnerability being patched is CVE-2022-2480. This vulnerability involves a use-after-free flaw in the Service Worker API, which acts as a proxy between web applications, the browser, and the network to improve offline user experiences.
- [$ 16000] [1336266] High CVE-2022-2477 : Use after free in Guest View. Reported by anonymous on 2022-06-14
- [$ 7500] [1335861] High CVE-2022-2478 : Use after free in PDF. Reported by triplepwns on 2022-06-13
- [$ 3000] [1329987] High CVE-2022-2479 : Insufficient validation of untrusted input in File. Reported by anonymous on 2022-05-28
- [$NA][1339844] High CVE-2022-2480 : Use after free in Service Worker API. Reported by Sergei Glazunov of Google Project Zero on 2022-06-27
- [$TBD][1341603] High CVE-2022-2481: Use after free in Views. Reported by YoungJoo Lee(@ashuu_lee) of CompSecLab at Seoul National University on 2022-07-04
- [$ 7000] [1308341] low CVE-2022-2163: Use after free in Cast UI and Toolbar. Reported by Chaoyuan Peng (@ret2happy) on 2022-03-21
- Those interested in learning more can read Google's announcement.
Don't forget to update Chrome immediately….
