![]() ![]() ![]() Google has a little background on the big vulnerability: It's related to “Integer overflow in Skia” and was reported by Benoît Sevens and Clément Lecigne of Google's Threat Analysis Group as of last Friday. If you have a Mac or a Linux system, the updated version you're looking for to ensure you are safe is called “ 1.199.” What's the Problem This Time? If automatic updates are turned on, Google will take a minute to download the new update, and you can then click the “ Relaunch” button in order to activate the latest version, protecting you from the newly-fixed vulnerability. You can check this by heading to “ Settings” and clicking the “ About Google” tab. If you're a Windows user, you'll need to have the most recent Chrome update, which is identified as “ 1.199/.200.” This is Google's sixth emergency update across 2023. If your automatic updates are turned on, relaunching the browser window should do the trick. Users should immediately update their ChromeOS in order to fix the latest zero-day vulnerability. Google has just issued an emergency patch for its Chrome browser. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |