Google Chrome, Edge & Opera just patched urgent security flaws — what to do right now
Google Chrome just patched urgent security flaws — what to do right now
Seven serious flaws fixed in latest update
Google has pushed out yet another security update to the desktop version of Chrome browser on Windows, Mac and Linux, the fourth such update in the past three weeks.
The new version of Chrome and its Chromium open-source underpinnings is labeled and was released late yesterday (April 20). It patches seven security flaws, including one "zero-day" (sort of) flaw that was disclosed in the wild before Google had a chance to fully patch it.
How to update Chrome
Updating Chrome is easy on Windows or Mac. The browser will automatically update itself when it launches, so you can just close and then relaunch it to trigger that process. On Linux, you'll likely have to wait for your distribution's next batch of updates.
To make certain Chrome has been updated, click the three vertical dots at the top-right of the browser window, move your cursor down to "Help" and click "About Google Chrome" in the fly-out menu that appears.
A new tab will open. It either will tell you that your browser is up-to-date or will download the new version, in which case you'll need to relaunch the browser.
That one flaw is assigned the catalog number CVE-2021-21224 and described as resulting from "Type Confusion in V8". Blog post author Srinivas Sista dryly noted that "Google is aware of reports that exploits for CVE-2021-21224 exist in the wild," normally the hallmark of a zero-day flaw.
Credit (and an as-yet-determined bug bounty) for that discovery goes to Argentine security researcher Jose Martinez of VerSprite Inc., whose hacker handle is "tr0y4".
On Twitter last night, Martinez explained that he'd submitted his bug report to Google on April 5, as confirmed by the Google blog post.
Martinez said Google fixed the issue in the open-source V8 engine April 12 and made the changes public, which meant that people like frust could reverse-engineer the changes and then claim to have found a "zero-day" flaw.
A real zero-day flaw is one that the affected software's developers aren't even aware of before it appears in the wild, hence giving them "zero days" to fix it before it becomes public.
All this hacking and patching has resulted in a busy month for Chrome and Chromium developers. Here's a list of the updates since March 1:
- 4/20: 90.0.4430.85
- 4/14: 90.0.4430.72
- 4/13: 89.0.4389.128
- 3/30: 89.0.4389.114
- 3/12: 89.0.4389.90
- 3/05: 89.0.4389.82
- 3/02: 89.0.4389.72
Several other well-known browsers base themselves on Chromium, including Brave, Microsoft Edge, Opera and Vivaldi. As of this writing (12:45 p.m. New York time April 21), Brave was still on the previous version of Chromium, Vivaldi was two versions behind and Opera three versions behind.
Edge uses a slightly different numbering system, but it has been updated at least once since its last documented security update on April 16, so we can presume Edge is up-to-date.
Updating Edge or Brave is similar to updating Chrome. Click the settings icon on the top right of the browser window and scroll down looking for something marked "About" at or near the bottom of the menu. "About" may also be hiding in a "Help" fly-out menu.
In Opera and Vivaldi, start by clicking the browser icon at the top left of the window, then scroll down to "Help" and click "About" in the fly-out menu.
As with Chrome, the "About" tab will generate a new tab that will check for and install any available updates.