» » Emergency Chrome 103 Update Patches Actively Exploited Vulnerability

Emergency Chrome 103 Update Patches Actively Exploited Vulnerability

Emergency Chrome 103 Update Patches Actively Exploited Vulnerability

Residence › Virus & Threats

Emergency Chrome 103 Replace Patches Actively Exploited Vulnerability

By Eduard Kovacs on July 04, 2022

Tweet

Whereas many anticipated — or at the very least hoped — that the 4th of July can be quiet on the cybersecurity entrance, Google on Monday introduced the discharge of an emergency Chrome replace that patches an actively exploited zero-day vulnerability.

The flaw, tracked as CVE-2022-2294, has been described as a heap buffer overflow in WebRTC. The safety gap was reported to Google by a member of the Avast Menace Intelligence crew on July 1.

The zero-day has been patched with the discharge of Chrome 103.0.5060.114 for Home windows.

No data has been made out there concerning the assaults exploiting CVE-2022-2294. SecurityWeek has reached out to Avast for extra data and can replace this text if the corporate can share any particulars.

That is the fourth actively exploited Chrome vulnerability that Google has patched this yr. The corporate stated lately that it has noticed a complete of 18 exploited zero-day vulnerabilities within the first half of 2022, and lots of of them exist as a result of earlier flaws weren’t correctly addressed.

Along with CVE-2022-2294, the newest Chrome replace patches two different high-severity points: CVE-2022-2295, a kind confusion within the V8 engine, and CVE-2022-2296, a use-after-free within the Chrome OS Shell element.

Associated: Chrome 102 Replace Patches Excessive-Severity Vulnerabilities

Associated: Google Points Emergency Repair for Chrome Zero-Day

Associated: Emergency Firefox Replace Patches Two Actively Exploited Zero-Day Vulnerabilities

Get the Each day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • Emergency Chrome 103 Replace Patches Actively Exploited Vulnerability
  • Specialists: California Lacked Safeguards for Gun Proprietor Information
  • Dutch Uni Will get Cyber Ransom Cash Again… With Curiosity
  • QuSecure Scores Publish-Quantum Cybersecurity Contract Value Extra Than $100M Yearly
  • Google: Half of 2022’s Zero-Days Are Variants of Earlier Vulnerabilities
  • Google Blocks Domains of Hack-for-Rent Teams in Russia, India, UAE
  • Cyberattack Disrupts Unemployment Advantages in Some States
  • Oak9 Lands $eight Million in New Enterprise Funding
  • North Korea Lazarus Hackers Blamed for $100 Million Horizon Bridge Heist
  • Token Raises $13 Million for Its Biometric Authentication Ring

Searching for Malware in All of the Incorrect Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act Via Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice 12 months To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

Defend Towards DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles