Govt warns Google Chrome users of high-level threat:CERT-In highlights some major vulnerabilities in the Chrome browser for the desktop. Google acknowledged the vulnerabilities and released a fix via a software update.
The Indian Computer Emergency Response Team (CERT-In) has warned Google Chrome users of a high level threat. The cybercrime nodal agency highlighted some major vulnerabilities in the Chrome browser for the desktop. CERT-In wants Chrome users to immediately update the browser to the latest version. Google acknowledged the vulnerabilities and released a fix via a software update.Govt warns Google Chrome users of high-level threat
Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed,” Google said in an official statement.
The agency highlighted that the Google Chrome version prior to 101.0.4951.41 had been impacted by a new flaw in the software. The threat is primarily for desktop users only. Google has acknowledged the flaw and listed 30 vulnerabilities on the Chrome blog post. Around seven flaws have been classified as ‘High’ threats.
CERT-In further explained that these high level vulnerabilities can be exploited and allow a remote attacker to execute arbitrary code and in turn gain access to sensitive information. The flaw is said to allow hackers to be able to bypass security restrictions and cause buffer overflow on the targeted system.
CERT-In has urged all Chrome desktop users to upgrade the browser to version 101.0.4951.41. The agency said that any version before this could be susceptible to attacks, which may eventually lead to loss of sensitive data. The vulnerabilities have been discovered in Windows, Mac as well as Linux.Google has started rolling out the update for Windows, Mac and Linux. The update should reach all users over the coming days or weeks.Govt warns Google Chrome users of high-level threat