The host is missing a critical severity security update according to Google advisory. The update is required to fix a use-after-free vulnerability. A flaw is present in the application, which fails to handle crafted data. Successful exploitation allows attackers to have unspecified impact.