Google Chrome update plugs score of security bugs
It's version 20 'cos it closes that many vulns
Google has updated its Chrome browser to address 20 vulnerabilities, none of which are deemed critical.
Chrome version 20 coincidentally covers patches for a score of security bugs, as listed here. Many of the fixed vulnerabilities involve "use-after-free" memory-related security bugs, some of which are rated as high risk.
Users of Chrome on all supported platforms (Windows, Mac, Linux and Chrome Frame) ought to review the cross-platform update. ®
..for the Iron update....
They have the choice of OSX or Linux. Windows was banned.
Memory management bug.
Obvious solution: use a language with built-in memory management. If too full of yourself to do that, use a memory management framework that doesn't free memory.
Or if, like MS, you have a large legacy codebase in a bug-prone language, use a coding policy and fire the programmers who make stupid mistakes. Speaking of which, when was the last time MS had a use-after-free memory bug. Last century?
I though Google was supposed to have hired smart people? While not necessarily a beginners mistake, it does at least indicate a lack of thought in design and test.