Google Fixes High-Severity Chrome Browser Code Execution Bug
The flaw in question stems from the WebGL component’s inability to properly handle objects stored in memory within the rendering function. According to researchers, a cyberattacker could use the vulnerability to manipulate the memory layout of the browser, allowing them to access the use-after-free exploit. This could eventually lead to arbitrary code execution. Google has urged its customers to implement the update as soon as possible, as it ranks 8.3 out of 10 on the CVSS scale.