![]() ![]() The release and propagation of the patch underscore Google’s commitment to mitigating potential threats and safeguarding users from the exploitation of this vulnerability. This recommendation is also extended to individuals using Chromium-based browsers, including Microsoft Edge, Brave, Opera, and Vivaldi, as they should apply the necessary patches once they become accessible. ![]() ![]() Users operating on different platforms -Windows, macOS, and Linux – are advised to promptly upgrade to Chrome version 1.132. The immediate response from Google is encapsulated in the release of a patch designed to amend the security flaw in the Chrome browser, effectively countering the risks posed by the vulnerability. It’s worth noting that this disclosure marks the fifth incident where Google has had to release patches for zero-day vulnerabilities in its Chrome browser within this year alone. ![]() The vulnerability was discerned and reported on September 25, 2023, by Clément Lecigne, a member of Google’s Threat Analysis Group (TAG). The failure mechanism associated with such vulnerabilities encompasses program crashes and potential execution of unspecified code, thereby adversely influencing the software’s availability and integrity. This critical element is part of a video codec library developed collaboratively by Google and the Alliance for Open Media (AOMedia). Identified as CVE-2023-5217, this substantial security flaw is a heap-based buffer overflow occurring within the VP8 compression format in libvpx. Google has promptly acted upon and patched another zero-day vulnerability, making it the fifth one to be addressed in 2023. The fifth exploited vulnerability in Google Chrome this year ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |