![]() ![]() 90 or later, then you already have the patch. Just click the three-dot button in the upper right corner of your browser. It might take a few days before it appears, despite Google’s expedited rollout, but you can apply the update manually. ![]() It’s an arrow pointing up inside a green circle, and it looks like this: The update button will appear in the upper right corner of your browser. Google started deploying the update across all internet-connected users (and if you’re using Google Chrome, you are most likely on the internet) on March 12th. While this seems trivial and mundane, a use-after-free vulnerability’s most common consequences are data corruption and arbitrary code execution, which, according to the National Vulnerability Database’s description of the CVE-2021-21193 vulnerability itself can allow “a remote attacker to potentially exploit heap corruption via a crafted HTML page.” How to update Google Chrome Basically, Blink was having trouble clearing the browser memory. This vulnerability, known as a use-after-free vulnerability, relates to incorrect usage of dynamic memory during a program operation. Specifically, this vulnerability comes from Google Chrome’s browser engine, Blink, a piece that translates HTML code into the Web page that you actually see in your browser. 90, patches several vulnerabilities, three of which have a high severity rating, and one of which has already been exploited by cybercriminals and hackers. There are frequent Google Chrome updates, but the most recent patch, stable build. ![]() If you use Google Chrome on any of your devices, it is urgent that you update it immediately. What is the CVE-2021-21193 vulnerability? ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |