Google fixes zero-day flaw in Chrome and Chrome OS
Flaw created by memory corruption bug in FreeType font-rendering library

Google has discovered htat the latest versions of Chrome and Chrome OS contained a zero-day security flaw.
Project Zero, Google’s security team responsible for finding these vulnerabilities, discovered hackers were using the bug to attack Chrome users’ systems. Google patched Chrome’s flaw a few days ago, and has now rolled out a fix for Chrome OS.
Today’s Chrome OS 86.0.4240.112 update addresses the detected zero-day security flaw on Google Chromebooks. The vulnerability was a memory corruption bug in the FreeType font-rendering library.
Other functional changes in the Chrome OS update include fixes for the 'Clear all' button and 'Pairing lost' notification, and flags for modifying the protection level against Spectre.
If you’re uncertain whether your Chrome OS is up to date or not, here’s how to find out if there’s a Chrome OS update:
- Click the “Settings” gear icon on the lower right corner of your screen
- Click “About Chrome OS” on the bottom of the left panel
- Find your Chrome OS version under “Google Chrome OS”
- Click “Check for updates”
- Your Chromebook will automatically download an update if one’s available
- Restart your Chromebook to complete the update
Two days ago, Google also launched Chrome version 86.0.4240.111, which included a patch for Chrome’s zero-day security vulnerability.
Users should have the Chrome patch by now, but you can check if your Chrome browser is up to date with these steps:
- Open your Chrome browser and look the three vertical dots on the top right corner
- If the dots are colored, there is a pending update
- Green means the update it less than two days old
- Orange means the update is about four days old
- Red means the update is a least a week old
- If the dots are colored, click them to open the menu
- Click “Update Google Chrome”
- Exit your Chrome browser and reopen it to complete the update
A zero-day security vulnerability is a previously unknown software flaw that would be of interest to the software developer or vendor. Cybercriminals and hackers can exploit this flaw to attack users, computer programs, data, other computers or a network.
How to scale your organisation in the cloud
How to overcome common scaling challenges and choose the right scalable cloud service
Download nowThe people factor: A critical ingredient for intelligent communications
How to improve communication within your business
Download nowFuture of video conferencing
Optimising video conferencing features to achieve business goals
Download nowImproving cyber security for remote working
13 recommendations for security from any location
Download now