![]() 90 or later, then you already have the patch. Just click the three-dot button in the upper right corner of your browser. It might take a few days before it appears, despite Google’s expedited rollout, but you can apply the update manually. It’s an arrow pointing up inside a green circle, and it looks like this: The update button will appear in the upper right corner of your browser. Google started deploying the update across all internet-connected users (and if you’re using Google Chrome, you are most likely on the internet) on March 12th. While this seems trivial and mundane, a use-after-free vulnerability’s most common consequences are data corruption and arbitrary code execution, which, according to the National Vulnerability Database’s description of the CVE-2021-21193 vulnerability itself can allow “a remote attacker to potentially exploit heap corruption via a crafted HTML page.” How to update Google Chrome Basically, Blink was having trouble clearing the browser memory. This vulnerability, known as a use-after-free vulnerability, relates to incorrect usage of dynamic memory during a program operation. Specifically, this vulnerability comes from Google Chrome’s browser engine, Blink, a piece that translates HTML code into the Web page that you actually see in your browser. 90, patches several vulnerabilities, three of which have a high severity rating, and one of which has already been exploited by cybercriminals and hackers. There are frequent Google Chrome updates, but the most recent patch, stable build. If you use Google Chrome on any of your devices, it is urgent that you update it immediately. What is the CVE-2021-21193 vulnerability?
0 Comments
Leave a Reply. |