From 5f5be67917988d55908a64faa2655a9f299ff94f Mon Sep 17 00:00:00 2001 From: Ryan Date: Thu, 18 Jan 2024 09:30:46 +0800 Subject: [PATCH] Google Chrome Zero Day Patch (#471) * Google Chrome Zero Day Patch * remove additional links section --------- Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com> --- .../20240117003-Google-Chrome-Patch.md | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 docs/advisories/20240117003-Google-Chrome-Patch.md diff --git a/docs/advisories/20240117003-Google-Chrome-Patch.md b/docs/advisories/20240117003-Google-Chrome-Patch.md new file mode 100644 index 00000000..eb262547 --- /dev/null +++ b/docs/advisories/20240117003-Google-Chrome-Patch.md @@ -0,0 +1,23 @@ +# Google Chrome Zero-Day Vulnerability Patch - 20240117003 + +## Overview + +Google has released a patch to address a number of known exploited vulnerabilities in the V8 JavaScript engine which is used in Chromium based browsers, such as Google Chrome. + +## What is vulnerable? + +Google Chrome versions **earlier** than: + +- **Windows** 120.0.6099.225 +- **Mac** 120.0.6099.234 + + +## What has been observed? + +There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer [Patch Management](../guidelines/patch-management.md)): + +- [Google Blog - Stable Channel Update for Desktop](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html) \ No newline at end of file