Google Chrome Gets Second Security Patch for Critical Zero-Day Bug in Two Weeks

Google said it was aware of reports that an exploit of the zero-day vulnerability exists in the wild.

Google Chrome Gets Second Security Patch for Critical Zero-Day Bug in Two Weeks

Google confirmed the exploitation of the zero-day flaw was unrelated to US elections

  • Second security patch for Google Chrome released in two weeks
  • The patch version 86.0.4240.183 is for Windows, Mac, and Linux systems
  • Google says the update will be rolling out over the next few days/weeks

Google has started rolling out a new security update for its Chrome browser on desktops. The new patch includes fixes to a total of 10 bugs in the browser, including a zero-day vulnerability — the second to have been noticed by Google's Threat Analysis Group (TAG) that tracks threat actors in the last two weeks. As always, Google says that details of the bug and links won't be revealed till a majority of Chrome users have installed the update and the vulnerabilities are also fixed in any related third-party library. A zero-day vulnerability refers to a recently discovered software security flaw that could have been already exploited by hackers.

The Google Chrome security patch version 86.0.4240.183 is being released for systems running on Windows, Mac, and Linux. Google in a blog published on the Chrome update on November 2 said that it was aware of reports that an exploit of the particular zero-day vulnerability identified as CVE-2020-16009 exists in the wild. The changelog of the update only has a passing mention that the zero-day bug was in V8 — an open-source JavaScript engine designed for Google Chrome and is also used by other Chromium browsers, such as Microsoft Edge and Opera.

The zero-day issue that the latest patch fixes is the second to be spotted in the last two weeks and the fourth in the last 12 months. Google had last released a security patch on October 20 to fix CVE-2020-15999 — an actively exploited memory corruption bug in the FreeType font rendering library within Chrome. A few days after releasing a security patch to fix it, Google on October 30 revealed that the zero-day CVE-2020-15999 was being exploited in conjunction with a windows zero-day vulnerability identified as CVE-2020-17087. While the malicious code was being executed inside Google Chrome, the Windows zero-day was increasing the code's privileges to attack the Windows OS. Ben Hawkes, the technical lead of Google's Project Zero, an elite team of bug hunters, has said that Microsoft is expected to issue a security patch to fix their security flaw on November 10.

While Google's TAG did not reveal if the two bugs were being exploited by the same threat actors, it confirmed that the motive of the attackers was unrelated to the US presidential elections.

Is Mi Notebook 14 series the best affordable laptop range for India? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts or RSS, download the episode, or just hit the play button below.


For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel.

Spotify Will Let Artists, Labels, Choose Which Songs to Promote in Radio, Autoplay
Share on Facebook Tweet Snapchat Share Reddit Comment google-newsGoogle News
© Copyright Red Pixels Ventures Limited 2023. All rights reserved.