From ad24992499371141fc7f8ae3e516926a2a5f9d2b Mon Sep 17 00:00:00 2001 From: Ryan Date: Wed, 17 Jan 2024 14:45:20 +0800 Subject: [PATCH] Google Chrome Zero Day Patch --- .../20240117003-Google-Chrome-Patch.md | 27 +++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 docs/advisories/20240117003-Google-Chrome-Patch.md diff --git a/docs/advisories/20240117003-Google-Chrome-Patch.md b/docs/advisories/20240117003-Google-Chrome-Patch.md new file mode 100644 index 000000000..bbadceacf --- /dev/null +++ b/docs/advisories/20240117003-Google-Chrome-Patch.md @@ -0,0 +1,27 @@ +# Google Chrome Zero-Day Vulnerability Patch - 20240117003 + +## Overview + +Google has released a patch to address a number of known exploited vulnerabilities in the V8 JavaScript engine which is used in Chromium based browsers, such as Google Chrome. + +## What is vulnerable? + +Google Chrome versions **earlier** than: + +- **Windows** 120.0.6099.225 +- **Mac** 120.0.6099.234 + + +## What has been observed? + +There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer [Patch Management](../guidelines/patch-management.md)): + +- [Google Blog - Stable Channel Update for Desktop](https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html) + + +## Additional References +