![]() ![]() Google urges users to install this update as soon as possible this means version 1.187 for Mac and Linux, and 1.187/.188 for Windows. AS well as this, Google has also announced that it has introduced weekly updates for Chrome, so even outside of emergencies, your Chrome browser is being updated (including security-wise) regularly. Google is aiming to get the patch update to all users in the coming weeks. The newly patched updated version of Chrome is currently being made available to the Stable and the Extended Stable release channels for updates. Google says it found the security flaw being exploited in the wild, so it's important to update as soon as possible.(Image credit: Shutterstock / Sundry Photography) What Google recommends Chrome users to do next ![]() It allows a malicious WebP image to cause a heap buffer overflow, which can potentially be used to take control of your computer. The security vulnerability (labelled as CVE-2023-4863) affects libwebp, one of the most common ways for applications to render WebP images. Vivaldi and Brave Brower are also now rolling out the fix. The security vulnerability also affects any browsers based on the Chromium project, so Microsoft just released Edge 1.81 to fix the same flaw. Otherwise, it should be automatically downloaded at some point in the coming days (if it hasn't already) and prompt you to restart the web browser. If you manually check for Chrome updates, the update will likely be found and installed. Google Chrome has now rolled out a patch for the security flaw in its Stable and Extended stable channels, starting with version 1.187 for Mac and Linux and version versions 1.187/.188 on Windows. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |