Text to Search... About Author Email address... Submit Name Email Adress Message About Me page ##1## of ##2## Jan Feb Mar Apr May Jun Jul Aug Sept Oct Nov Dec



4/carousel3/

6/newsticker//recent

404

Sorry, this page is not avalable
Home

Latest Articles

Update Chrome Browser Now: 4th Zero-Day Exploit Discovered in May 2024

Google on Thursday rolled out fixes to address a high-severity security flaw in its Chrome browser that it said has been exploited in the wild.


Assigned the CVE identifier CVE-2024-5274, the vulnerability relates to a type confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Clément Lecigne of Google's Threat Analysis Group and Brendon Tiszka of Chrome Security on May 20, 2024.


Type confusion vulnerabilities occur when a program attempts to access a resource with an incompatible type. It can have serious consequences as it allows threat actors to perform out-of-bounds memory access, cause a crash, and execute arbitrary code.


The development marks the fourth zero-day that Google has patched since the start of the month after CVE-2024-4671, CVE-2024-4761, and CVE-2024-4947.


The tech giant did not disclose additional technical details about the flaw, but acknowledged that it "is aware that an exploit for CVE-2024-5274 exists in the wild." It's not clear if the shortcoming is a patch bypass for CVE-2024-4947, which is also a type confusion bug in V8.


With the latest fix, Google has resolved a total of eight zero-days have been resolved by Google in Chrome since the start of the year -

  • CVE-2024-0519 - Out-of-bounds memory access in V8
  • CVE-2024-2886 - Use-after-free in WebCodecs (demonstrated at Pwn2Own 2024)
  • CVE-2024-2887 - Type confusion in WebAssembly (demonstrated at Pwn2Own 2024)
  • CVE-2024-3159 - Out-of-bounds memory access in V8 (demonstrated at Pwn2Own 2024)
  • CVE-2024-4671 - Use-after-free in Visuals
  • CVE-2024-4761 - Out-of-bounds write in V8
  • CVE-2024-4947 - Type confusion in V8

Users are recommended to upgrade to Chrome version 125.0.6422.112/.113 for Windows and macOS, and version 125.0.6422.112 for Linux to mitigate potential threats.


Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.


via thehackernews

unixlegion.com uses cookies to improve your experience. I agree