Hide Blink components. Discuss File an issue Privacy About File an issue Privacy About.
For Windows 10/8.1/8/7 32-bit. For Windows 10/8.1/8/7 64-bit. This computer will no longer receive Google Chrome updates because Windows XP and Windows Vista are no longer supported. Keeping the latest stable chrome installed (Ubuntu) edit. Asked 2017-12-06 16:41:48 -0600. Tylerecouture 39. The latest stable Chrome is a rather minor update. Google Chrome Beta 84.0.4147.30. Get an early peek at the next stable release of Chrome without putting your system too much at risk. Freeware Deal of the Day-80%. Windows 10 Professional. Offer Ends In: Buy Today and Save. As of April 2020, Google Chrome has captured 68% of the total browser market. In contrast, the second biggest browser in the world, the Mozilla Firefox, has just 8.21% market share.
It’s never a bad time to make sure that all your software is updated in order to keep yourself safe from any potential issues or exploits that might have been discovered in a previous version. Sometimes the situation is far more serious though, and the developers behind your apps discover a bug that needs to be addressed as soon as possible. That’s the case with Google Chrome this week, as two zero-day exploits have just been patched.
On Wednesday, November 11th, Google rolled out a stable channel update for the desktop version of Chrome on Windows, Mac, and Linux addressing two high-severity vulnerabilities being called CVE-2020-16013 and CVE-2020-16017. You should be on version 86.0.4240.198 of Chrome, which you can check by typing chrome://settings/help in the address bar. Chrome should update automatically, at which point you can relaunch to finish updating.
As explained by Threatpost, CVE-2020-16017 as a “use-after-free in site isolation” bug, which an attacker can exploit by creating a webpage, leading an unaware user to that webpage, triggering an error, and executing the code on the victim’s system. CVE-2020-16013 is an “inappropriate implementation in V8” bug, which leads to the software failing to implement or incorrectly implementing one or more security checks. V8 is a component which handles JavaScript and WebAssembly, and attackers can use the same method described above to exploit it.
Whether or not any of us were at risk of having our systems taken over or our data stolen is unclear, but the fact is that these are just two of five zero-day exploits that Google has had to patch in Chrome within the last three weeks. The good news is that Google’s security researchers are finding these exploits about as quickly as they are being discovered by bad actors, but it appears that the hacking community is more aggressive as of late.
Most importantly, this just serves as another reminder that you shouldn’t put off updating your software when a new update drops. Yes, there will occasionally be problems that will need to be addressed in a subsequent update, but the next zero-day exploit could be one that ends with you having important data stolen.