![]() ![]() In some languages, like C and C++, the vulnerability can result in out-of-bounds memory access. It can cause a browser to crash or trigger an error, which has the potential to allow arbitrary code to be executed.Google wrote, “With a type-confusion flaw, a program will allocate a resource like a pointer or object using one type but later will access the resource using another, incompatible type. ![]() This is the type of Google Chrome bug is similar to one that Google patched on March 26. An unnamed cybersecurity researcher previously reported a zero-day exploit bug to Google, CVE-2022-1096. ![]() Hence, Google has to issue the third emergency update for Google Chrome this year. Google Chrome security update has released an emergency fix for the CVE-2022-1096 vulnerability exploit. Google in one of its blog posts mentioned that the bug is already being exploited in the wild and is actively being used by attackers. Reportedly, the bug is a Type Confusion in V8 vulnerability, which is Google's open source high-performance JavaScript and WebAssembly engine. This new update comes with a pair of security fixes, including a "type confusion" vulnerability designated as CVE-2022-1364. The Stable Channel Update introduced version 1.127, on macOS, Windows, and Linux. Google has issued its third urgent update for Google Chrome on Thursday, to patch the zero-day vulnerability in the highly-used desktop web browser. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |