In response to a heap buffer overflow vulnerability, Google has released a security update for the desktop versions of Google Chrome for Windows, Linux, and Mac. The Chrome vulnerability is already being used in the wild, claims Google’s own blog. This is the eighth time this year that a Google Chrome zero-day vulnerability has been used in an attack. Exploiting this flaw could cause programmes to crash, execute arbitrary code, or even let an attacker get past security measures and take control of the underlying system.
The vulnerability tracked as CVE-2022-4135 is a Heap buffer overflow in GPU. Google is holding back on releasing any further details for now. They do this to prevent further exploitation of the bug until a majority of users has had a chance to update to the fixed version of Chrome. Heap buffer overflow is a memory vulnerability that can result in data being written to forbidden locations. Attackers can in turn use this to overwrite an application’s memory to manipulate its execution path, leading to unrestricted information access or arbitrary code execution.
Update Vulnerable Google Chrome Installations
In order to protect yourself against the vulnerability mentioned above, Google advises updating all Google Chrome installations to the new patched version. For Windows that is 107.0.5304.121/.122, for Mac and Linux that is version 107.0.5304.121. You can find more information about the security fix on Google’s release blog.
Remember, CyberSecurity Starts With You!
- Globally, 30,000 websites are hacked daily.
- 64% of companies worldwide have experienced at least one form of a cyber attack.
- There were 20M breached records in March 2021.
- In 2020, ransomware cases grew by 150%.
- Email is responsible for around 94% of all malware.
- Every 39 seconds, there is a new attack somewhere on the web.
- An average of around 24,000 malicious mobile apps are blocked daily on the internet.