Tech

Update Google Chrome, a flaw is being exploited

Google Chrome has just received a security update to fix four flaws. One is already in use.

People who use Google Chrome should update the web browser without wasting a minute, as a security issue was reported on June 17 by the US company. More exactly, there are four of them but one of them proves to be more worrying than the others. Google has indeed learned that one of these flaws is currently being used for malicious purposes.

The vulnerability in question concerns the WebGL library, which is used to display 2D or 3D graphics in your web browser without having to install any add-ons. WebGL is supported by all major browsers (besides Chrome, there is Firefox, Safari, Edge, Opera…). Moreover, WebGL, an open standard, participates in the replacement of Flash.

Google Chrome. // Source: Google

This vulnerability, like the three others (which concern the Sharing, WebAudio, TabGroups components), is of the “use after free” type. This is due to incorrect management in the browser memory. It turns out that a significant number of concerns in Chrome are of the “use after free” type. More generally, many vulnerabilities in browsers are memory-related.

It is not possible to consult these vulnerabilities in detail today, as the new version of Google Chrome is not yet sufficiently distributed – the update has only been offered since June 17 and the deployment should take a few weeks. This precaution prevents more malicious individuals from being able to develop techniques to exploit these breaches.

The correct version of Google Chrome is numbered 91.0.4472.114. It is available for Windows, Mac and Linux.

How to update Google Chrome

  • Launch the browser;
  • Go to the top right of the screen and click on the vertical ellipses;
  • Go to the “Help” line, then “About Google Chrome”;
  • On the page you can read the version number installed on your computer.
  • If you are already up to date, the browser does nothing in particular. Otherwise, the update starts.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *