Google Releases Chrome 120: Introducing Enhanced Security Measures

Google has recently rolled out Chrome 120, the latest version of its renowned web browser for Windows, Mac, and Linux users. Placing significant emphasis on improving the browsing experience, this update comes equipped with ten crucial security patches. In this article, we will explore the features and security enhancements of Chrome 120 and highlight the high-severity issues addressed, including bounties awarded for their discovery.

Chrome Version and Security Patches

The most recent versions of Chrome available for users are 120.0.6099.62 for Linux and macOS, and 120.0.6099.62 and .63 for Windows. Key updates include a remarkable total of ten security patches aimed at fortifying the browser against potential vulnerabilities.

High-severity Issue: CVE-2023-6508 – Use After Free in Media Stream

One of the notable vulnerabilities addressed in Chrome 120 is the high-severity issue identified as CVE-2023-6508, a use after free vulnerability in Media Stream. This issue could potentially allow attackers to execute arbitrary code by exploiting memory corruption. Cassidy Kim (@cassidy6564) was instrumental in reporting this vulnerability, leading to a $10,000 bounty being awarded by Google for their contribution to improving Chrome’s security.

Another high-severity issue: CVE-2023-6509 – Use After Free in Side Panel Search

Another significant vulnerability is CVE-2023-6509, characterized as a use-after-free vulnerability in Side Panel Search. Immediate action was taken by Google to fix this flaw, which allowed attackers to manipulate memory and potentially launch malicious code on affected systems. For identifying this issue, Google provided a $1,000 bounty to the individual responsible.

Yet Another Issue: CVE-2023-6510 – Use After Free in Media Capture

Within Chrome 120, Google has addressed CVE-2023-6510, a use-after-free vulnerability in Media Capture. This security flaw had the potential to be exploited by attackers, enabling them to execute potentially harmful code on affected systems. In recognition of this discovery, another $1,000 bounty was rewarded by Google.

Low-severity Bug: CVE-2023-6511 – Inappropriate Implementation in Autofill

Chrome 120 also addresses a low-severity bug known as CVE-2023-6511, related to an inappropriate implementation of Autofill. While not as critical as some of the other vulnerabilities, this bug could still potentially lead to data leakage or undesired behavior. Google has taken prompt action to resolve this issue, thus ensuring user privacy and safety.

Considering the critical nature of these vulnerabilities, Google urges all Chrome users to promptly update their browsers to Chrome 120. By doing so, users can avoid falling victim to potential exploits and ensure a safer browsing experience. Regular updates are crucial for mitigating risks posed by emerging security threats. This latest release emphasizes Google’s commitment to maintaining an agile and secure web browsing environment for its users.

In a digital landscape where cyber threats continue to evolve, staying up to date with the latest browser versions not only enhances the security of your online activities but also safeguards your sensitive information. By actively adopting the latest updates, we can collectively protect ourselves and contribute to a safer online ecosystem.

Explore more

Trend Analysis: Agentic Commerce Protocols

The clicking of a mouse and the scrolling through endless product grids are rapidly becoming relics of a bygone era as autonomous software entities begin to manage the entirety of the consumer purchasing journey. For nearly three decades, the digital storefront functioned as a static visual interface designed for human eyes, requiring manual navigation, search, and evaluation. However, the current

Trend Analysis: E-commerce Purchase Consolidation

The Evolution of the Digital Shopping Cart The days when consumers would reflexively click “buy now” for a single tube of toothpaste or a solitary charging cable have largely vanished in favor of a more calculated, strategic approach to the digital checkout experience. This fundamental shift marks the end of the hyper-impulsive era and the beginning of the “consolidated cart.”

UAE Crypto Payment Gateways – Review

The rapid metamorphosis of the United Arab Emirates from a desert trade hub into a global epicenter for programmable finance has fundamentally altered how value moves across the digital landscape. This shift is not merely a superficial update to checkout pages but a profound structural migration where blockchain-based settlements are replacing the aging architecture of correspondent banking. As Dubai and

Exsion365 Financial Reporting – Review

The efficiency of a modern finance department is often measured by the distance between a raw data entry and a strategic board-level decision. While Microsoft Dynamics 365 Business Central provides a robust foundation for enterprise resource planning, many organizations still struggle with the “last mile” of reporting, where data must be extracted, cleaned, and reformatted before it yields any value.

Clone Commander Automates Secure Dynamics 365 Cloning

The enterprise landscape currently faces a significant bottleneck when IT departments attempt to replicate complex Microsoft Dynamics 365 environments for testing or development purposes. Traditionally, this process has been marred by manual scripts and human error, leading to extended periods of downtime that can stretch over several days. Such inefficiencies not only stall mission-critical projects but also introduce substantial security