Chrome security lead urges you to patch it to avoid new exploit

Donna Miller
March 8, 2019

Google Chrome's security lead has warned all the Chrome web browser (Windows, Mac, and Linux) users to update their applications to 72.0.3626.121 version immediately to protect themselves from a major security issue.

What this means is that if your Google Chrome version is as seen in the image above, it is not enough to benefit from the latest fix.

It said that the flaw was a "Use-After-Free", which is a type of flaw that corrupts how a web app accesses a computer's memory and can be used to install malicious software on a computer, causing it to crash or behave strangely. "We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed". The class of memory corruption bug can be risky and is commonly found by researchers who look for flaws in browsers.

The version of Chrome you should be running is 72.0.3626.121, released at the beginning of March 2019. Either way, you can check for updates by clicking on the three vertical dots in the browser's upper-right corner and navigating to Help About Google Chrome.

Robert Kraft ordered to appear in court later this month
Ten spas have been closed and several people, mostly women originally from China, have been charged with running the operation. Kraft was allegedly seen paying with a $100 bill after each visit and hugging women before leaving the building.

Google recommends users of Windows 7 to give it up and move to Microsoft's latest operating system if they want to keep systems safe from a zero-day vulnerability exploited in the wild.

The two zero-days were part of ongoing cyber-attacks that Clement Lecigne, a member of Google's Threat Analysis Group, discovered last week on February 27.

Chrome OS users can update their version by selecting settings, then going to the menu and selecting "About Chrome OS". Google also says it is aware of the vulnerability being actively exploited in the wild.

Other reports by

Discuss This Article

FOLLOW OUR NEWSPAPER