Google Releases Chrome 120: Introducing Enhanced Security Measures

Google has recently rolled out Chrome 120, the latest version of its renowned web browser for Windows, Mac, and Linux users. Placing significant emphasis on improving the browsing experience, this update comes equipped with ten crucial security patches. In this article, we will explore the features and security enhancements of Chrome 120 and highlight the high-severity issues addressed, including bounties awarded for their discovery.

Chrome Version and Security Patches

The most recent versions of Chrome available for users are 120.0.6099.62 for Linux and macOS, and 120.0.6099.62 and .63 for Windows. Key updates include a remarkable total of ten security patches aimed at fortifying the browser against potential vulnerabilities.

High-severity Issue: CVE-2023-6508 – Use After Free in Media Stream

One of the notable vulnerabilities addressed in Chrome 120 is the high-severity issue identified as CVE-2023-6508, a use after free vulnerability in Media Stream. This issue could potentially allow attackers to execute arbitrary code by exploiting memory corruption. Cassidy Kim (@cassidy6564) was instrumental in reporting this vulnerability, leading to a $10,000 bounty being awarded by Google for their contribution to improving Chrome’s security.

Another high-severity issue: CVE-2023-6509 – Use After Free in Side Panel Search

Another significant vulnerability is CVE-2023-6509, characterized as a use-after-free vulnerability in Side Panel Search. Immediate action was taken by Google to fix this flaw, which allowed attackers to manipulate memory and potentially launch malicious code on affected systems. For identifying this issue, Google provided a $1,000 bounty to the individual responsible.

Yet Another Issue: CVE-2023-6510 – Use After Free in Media Capture

Within Chrome 120, Google has addressed CVE-2023-6510, a use-after-free vulnerability in Media Capture. This security flaw had the potential to be exploited by attackers, enabling them to execute potentially harmful code on affected systems. In recognition of this discovery, another $1,000 bounty was rewarded by Google.

Low-severity Bug: CVE-2023-6511 – Inappropriate Implementation in Autofill

Chrome 120 also addresses a low-severity bug known as CVE-2023-6511, related to an inappropriate implementation of Autofill. While not as critical as some of the other vulnerabilities, this bug could still potentially lead to data leakage or undesired behavior. Google has taken prompt action to resolve this issue, thus ensuring user privacy and safety.

Considering the critical nature of these vulnerabilities, Google urges all Chrome users to promptly update their browsers to Chrome 120. By doing so, users can avoid falling victim to potential exploits and ensure a safer browsing experience. Regular updates are crucial for mitigating risks posed by emerging security threats. This latest release emphasizes Google’s commitment to maintaining an agile and secure web browsing environment for its users.

In a digital landscape where cyber threats continue to evolve, staying up to date with the latest browser versions not only enhances the security of your online activities but also safeguards your sensitive information. By actively adopting the latest updates, we can collectively protect ourselves and contribute to a safer online ecosystem.

Explore more

AI and Generative AI Transform Global Corporate Banking

The high-stakes world of global corporate finance has finally severed its ties to the sluggish, paper-heavy traditions of the past, replacing the clatter of manual data entry with the silent, lightning-fast processing of neural networks. While the industry once viewed artificial intelligence as a speculative luxury confined to the periphery of experimental “innovation labs,” it has now matured into the

Is Auditability the New Standard for Agentic AI in Finance?

The days when a financial analyst could be mesmerized by a chatbot simply generating a coherent market summary have vanished, replaced by a rigorous demand for structural transparency. As financial institutions pivot from experimental generative models to autonomous agents capable of managing liquidity and executing trades, the “wow factor” has been eclipsed by the cold reality of production-grade requirements. In

How to Bridge the Execution Gap in Customer Experience

The modern enterprise often functions like a sophisticated supercomputer that possesses every piece of relevant information about a customer yet remains fundamentally incapable of addressing a simple inquiry without requiring the individual to repeat their identity multiple times across different departments. This jarring reality highlights a systemic failure known as the execution gap—a void where multi-million dollar investments in marketing

Trend Analysis: AI Driven DevSecOps Orchestration

The velocity of software production has reached a point where human intervention is no longer the primary driver of development, but rather the most significant bottleneck in the security lifecycle. As generative tools produce massive volumes of functional code in seconds, the traditional manual review process has effectively crumbled under the weight of machine-generated output. This shift has created a

Navigating Kubernetes Complexity With FinOps and DevOps Culture

The rapid transition from static virtual machine environments to the fluid, containerized architecture of Kubernetes has effectively rewritten the rules of modern infrastructure management. While this shift has empowered engineering teams to deploy at an unprecedented velocity, it has simultaneously introduced a layer of financial complexity that traditional billing models are ill-equipped to handle. As organizations navigate the current landscape,