Google Updates Chrome 18  Security To Spotting ‘Critical’ Security Vulnerability

Google is update its Chrome Web browser across the Windows, Mac, & Linux platforms after the discovering a critical bug. Without sharing many details about these bug itself, Google stated the vulnerability ‘CVE-2020-6457′ are pointed out earlier  month and is the found of the speech recognition tool. In The company  blog post are also announced that the stable channel have been updated to the Chrome version 81.0.4044.113 and will roll out over the coming days – indicating the vulnerability has been fixed through the update.

 

The Google in the blog post published on the  April 15 also said, In the Access to bug details and links may be kept the restricted until a majority of users are updated with a fix. The company added that Google will also a retain restrictions if these bug exists in a third party library that other projects similarly depend on, but have not  yet fixed.

 

In the  mentioned, Google has not shared details about these security vulnerability other than the name (CVE-2020-6457) along with a vague description: In the Use after free in speech recognizer.” Even the US National Vulnerability Database which are maintains databases of security checklists & security-related software flaws describes the CVE-2020-6457 bug as “reserved”, meaning no information about these bug has been made public yet.

 

According to report by Forbes stated that once a “use after free vulnerability” is triggered after the  visiting a malicious Web page, users’ computer system can be compromised. These report added since in the potential consequences of this vulnerability are high Google has rated this as a critical security issue.

 

In the Users can check their Google Chrome version by tapping on the ‘three vertical dots’ at the top right corner on their Chrome browser. From there users need to select Help > About Google Chrome. The dots are not visible, users may see a red icon with an upward white arrow in it, indicating them to update their browser.

Leave a Comment