Google yesterday updated the its browser for Windows, Mac and Linux machines, fixing two vulnerabilities, including one considered high in severity.

In a blog post, Google described the more serious bug as a "function signature mismatch" in WebAssembly binary language. The vulnerability has yet to be assigned a CVE number, but it did manage to fetch a $3,000 bug bounty for Kevin Cheung from Autodesk, who reported the problem.

A second, medium-severity bug consists of a URL spoofing condition in Chrome's Omnibox address bar, which was reported by evi1m0 of Bilibili Security Team.

Please register to continue.

Already registered? Log in.

Once you register, you'll receive:

  • News analysis

    The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.

  • Archives

    Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.

  • Daily Newswire

    SC Media’s essential morning briefing for cybersecurity professionals.

  • Learning Express

    One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.