{"id":734,"date":"2022-12-13T11:03:50","date_gmt":"2022-12-13T11:03:50","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=734"},"modified":"2022-12-13T11:03:50","modified_gmt":"2022-12-13T11:03:50","slug":"google-releases-another-zero-day-vulnerability-patch-for-the-chrome-browser","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=734","title":{"rendered":"Google Releases Another Zero-Day Vulnerability Patch for the Chrome Browser"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D734\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=734&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><p>A new zero-day flaw in Google&#8217;s Chrome web browser that has been actively exploited was fixed in an out-of-band security update on Friday.<\/p>\n<p>A type confusion issue in the V8 JavaScript engine is the subject of the high-severity flaw, which is categorized as CVE-2022-4262. On November 29, 2022, the issue was reported by Google&#8217;s Threat Analysis Group (TAG) employee Clement Lecigne.<\/p>\n<p>Threat actors could use type confusion vulnerabilities to gain access to memory that is out of bounds or cause a crash and arbitrary code execution.<\/p>\n<p>As indicated by the NIST&#8217;s Public Weakness Data set, the defect allows a &#8220;distant assailant to possibly take advantage of store defilement through a created HTML page.&#8221;<br \/>\nGoogle acknowledged that the vulnerability was actively exploited, but it did not provide any additional details to stop further abuse.<\/p>\n<p>&nbsp;<\/p>\n<p>CVE-2022-4262 is the fourth actively exploited type confusion flaw in Chrome that Google has addressed since the start of the year. It&#8217;s also the ninth zero-day flaw attackers have exploited in the wild in 2022 &#8211;<\/p>\n<p>CVE-2022-0609 &#8211; Use-after-free in Animation<br \/>\nCVE-2022-1096 &#8211; Type confusion in V8<br \/>\nCVE-2022-1364 &#8211; Type confusion in V8<br \/>\nCVE-2022-2294 &#8211; Heap buffer overflow in WebRTC<br \/>\nCVE-2022-2856 &#8211; Insufficient validation of untrusted input in Intents<br \/>\nCVE-2022-3075 &#8211; Insufficient data validation in Mojo<br \/>\nCVE-2022-3723 &#8211; Type confusion in V8<br \/>\nCVE-2022-4135 &#8211; Heap buffer overflow in GPU<br \/>\nUsers are recommended to upgrade to version 108.0.5359.94 for macOS and Linux and 108.0.5359.94\/.95 for Windows to mitigate potential threats.<\/p>\n<p>Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they become available.<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D734\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=734&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>A new zero-day flaw in Google&#8217;s Chrome web browser that has been actively exploited was fixed in an out-of-band security update on Friday. A type confusion issue in the V8 JavaScript engine is the subject of the high-severity flaw, which is categorized as CVE-2022-4262. On November 29, 2022, the issue was reported by Google&#8217;s Threat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[11],"tags":[],"class_list":["post-734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-wml"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/734"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=734"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/734\/revisions"}],"predecessor-version":[{"id":736,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/734\/revisions\/736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/735"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}