Google Releases Chrome 120: Introducing Enhanced Security Measures

Google has recently rolled out Chrome 120, the latest version of its renowned web browser for Windows, Mac, and Linux users. Placing significant emphasis on improving the browsing experience, this update comes equipped with ten crucial security patches. In this article, we will explore the features and security enhancements of Chrome 120 and highlight the high-severity issues addressed, including bounties awarded for their discovery.

Chrome Version and Security Patches

The most recent versions of Chrome available for users are 120.0.6099.62 for Linux and macOS, and 120.0.6099.62 and .63 for Windows. Key updates include a remarkable total of ten security patches aimed at fortifying the browser against potential vulnerabilities.

High-severity Issue: CVE-2023-6508 – Use After Free in Media Stream

One of the notable vulnerabilities addressed in Chrome 120 is the high-severity issue identified as CVE-2023-6508, a use after free vulnerability in Media Stream. This issue could potentially allow attackers to execute arbitrary code by exploiting memory corruption. Cassidy Kim (@cassidy6564) was instrumental in reporting this vulnerability, leading to a $10,000 bounty being awarded by Google for their contribution to improving Chrome’s security.

Another high-severity issue: CVE-2023-6509 – Use After Free in Side Panel Search

Another significant vulnerability is CVE-2023-6509, characterized as a use-after-free vulnerability in Side Panel Search. Immediate action was taken by Google to fix this flaw, which allowed attackers to manipulate memory and potentially launch malicious code on affected systems. For identifying this issue, Google provided a $1,000 bounty to the individual responsible.

Yet Another Issue: CVE-2023-6510 – Use After Free in Media Capture

Within Chrome 120, Google has addressed CVE-2023-6510, a use-after-free vulnerability in Media Capture. This security flaw had the potential to be exploited by attackers, enabling them to execute potentially harmful code on affected systems. In recognition of this discovery, another $1,000 bounty was rewarded by Google.

Low-severity Bug: CVE-2023-6511 – Inappropriate Implementation in Autofill

Chrome 120 also addresses a low-severity bug known as CVE-2023-6511, related to an inappropriate implementation of Autofill. While not as critical as some of the other vulnerabilities, this bug could still potentially lead to data leakage or undesired behavior. Google has taken prompt action to resolve this issue, thus ensuring user privacy and safety.

Considering the critical nature of these vulnerabilities, Google urges all Chrome users to promptly update their browsers to Chrome 120. By doing so, users can avoid falling victim to potential exploits and ensure a safer browsing experience. Regular updates are crucial for mitigating risks posed by emerging security threats. This latest release emphasizes Google’s commitment to maintaining an agile and secure web browsing environment for its users.

In a digital landscape where cyber threats continue to evolve, staying up to date with the latest browser versions not only enhances the security of your online activities but also safeguards your sensitive information. By actively adopting the latest updates, we can collectively protect ourselves and contribute to a safer online ecosystem.

Explore more