Google formed Chrome updates 97.0.4692.99 and 96.0.4664.174 (extended stable), in which 26 vulnerabilities are fixed, including The number of critical vulnerability (CVE-2022-0289), which allows you to bypass all the levels of protecting the browser and execute the code in the system outside the Sandbox environment. Details while are not disclosed , it is only known that the critical vulnerability is related to the appeal to the already released memory (use-after-free) in the implementation of Safe Browsing regime .
From other corrected vulnerabilities, it is possible to note the problems with the already released memory in the site insulation mechanism, Web Pack technology and a code related to the processing of push notifications, an OmniBox address string, printing, using API Vulkan, editing input methods, Work with bookmarks. In the tools for web developments and PDF document viewers, PDFIUM identified problems resulting in buffer overflow. In the Auto Filling System, the STORAGE and API Fenced Frames APIs are eliminated on the security of the error in the implementation.