Chrome has a security flaw that can be serious; update now

Chrome fixes a security flaw

Although things are somewhat more distributed among Linux users, the most used web browser in the world is the Chrome of Google. For that reason, and because it is also used in Windows and macOS, news like this is important. And it is that Google warned that its web browser had a security flaw that affected all the platforms on which it is available, although it has an easy solution.

According to Google, the security flaw detected has / had impacts ranging from low to high. This is CVE-2021-37973, a "zero day" exploit that hackers have exploited. The good news is that the patch is already available in the latest version of Chrome, so protecting yourself from this security flaw is as simple as updating your browser.

Google has already patched the serious Chrome bug

Right now, in the Miter page There is no description of the problem, limiting itself to saying in this section that the information is reserved. Even so, although the news began to circulate on the network a few days ago, on September 24 the patch was released for latest browser version. Windows and macOS users have already received the update from the same browser, while those of Linux, rare would be the case in which it had not appeared in the repository that some distributions add when installing the browser for the first time or in AUR in Arch Linux based systems.

As we always say when we publish a news of this type, it is important to have the software well updated. Although it is true that sometimes we can find an unexpected failure, this is not the most common, and by installing the latest versions we will also be applying security patches such as the one that will prevent hackers from continuing to compromise the security of Chrome by CVE-2021 -37973.


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.