Google notes that this particular bug has “an exploit” that “exists in the wild” - their way of saying that a hacking group could have done some damage through this vulnerability. Google has a little background on the big vulnerability: It's related to “Integer overflow in Skia” and was reported by Benoît Sevens and Clément Lecigne of Google's Threat Analysis Group as of last Friday. ![]() If you have a Mac or a Linux system, the updated version you're looking for to ensure you are safe is called “ 1.199.” What's the Problem This Time? If automatic updates are turned on, Google will take a minute to download the new update, and you can then click the “ Relaunch” button in order to activate the latest version, protecting you from the newly-fixed vulnerability. You can check this by heading to “ Settings” and clicking the “ About Google” tab. If you're a Windows user, you'll need to have the most recent Chrome update, which is identified as “ 1.199/.200.” This is Google's sixth emergency update across 2023. If your automatic updates are turned on, relaunching the browser window should do the trick. ![]() ![]() Users should immediately update their ChromeOS in order to fix the latest zero-day vulnerability. Google has just issued an emergency patch for its Chrome browser.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |