Google Release Chrome Update to Fix New Zero-day Flaw
Google has released an emergency patch to fix a zero-day vulnerability exploited in the wild. Tracked as CVE-2022-3075, the zero-day flaw was discovered and reported on August 30, 2022 by an anonymous researcher.
The flaw is an insufficient data validation in Mojo. This refers to a collection of runtime libraries that provide a platform-agnostic mechanism for inter-process communication (IPC).
Google admitted that it “is aware of reports that an exploit for CVE-2022-3075 exists in the wild.” The tech giant however failed to provide additional specifics on the nature of the attacks that can help users prevent additional threat actors from exploiting the flaw.
Google ask users to upgrade to version 105.0.5195.102 for Windows, macOS, and Linux to mitigate imminent threats. Users of Chromium-based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are advised to apply fixes as soon as they are available.
The update makes it the sixth zero-day vulnerability in Chrome that Google has patched since the start of the year. The other five flaws include CVE-2022-0609, CVE-2022-1096, CVE-2022-1096, CVE-2022-1364, CVE-2022-2294, CVE-2022-2856.
CVE-2022-0609 is as user-after-free vulnerability in the Animation component that if successfully exploited could lead to corruption of valid data and the execution of arbitrary code on affected systems.
CVE-2022-2294 is a heap overflow flaw in the WebRTC component that provides real-time audio and video communication capabilities in browsers without the need to install plugins or download native apps.
CVE-2022-2856 is a case of insufficient validation of untrusted input in Intents.
The sources for this piece include an article in TheHackerNews.