Chrome issues emergency update after vulnerability was discovered on its previous update

Share post:

On December 2, 2022, Google released a new version of its Chrome web browser for desktop operating systems and Android. The new Chrome 108.0.5359.94/.95 update for Windows, Mac, and Linux users addresses a single high-severity security flaw, the ninth Chrome zero-day exploited in the wild patched since the beginning of the year.

The CVE-2022-4262 high-severity flaw is related to a type confusion bug in the V8 JavaScript engine. On November 29, 2022, Clement Lecigne of Google’s Threat Analysis Group (TAG) was credited with reporting the issue.

Threat actors could exploit the vulnerabilities to perform out-of-bounds memory access or to cause a crash and arbitrary code execution. Although type confusion security flaws typically result in browser crashes after successful exploitation by reading or writing memory outside of buffer bounds, threat actors can also use them to execute arbitrary code.

Chrome instances that have not been updated to the latest version may be successfully attacked. Naturally, attacks will not occur on all visited websites, but there are specially prepared websites that target vulnerable devices. The Chrome 108 update arrives just a few days after the main Chrome 108 upgrade, which fixed 28 different security issues in the browser.

According to Google, the new version has begun to be distributed to users in the Stable Desktop channel, and it will be available to the entire user base within a few days or weeks. After the next launch, the web browser will also automatically check for new updates and install them without requiring user interaction. Other Chromium-based browsers, such as Edge, Brave, Vivaldi, and Opera, are also expected to release security updates in the coming days and weeks to address the issue.

The sources for this piece includes an article in TheHackerNews.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways