• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Google Detects 4th Chrome Zero-Day in May Actively Under Attack – Update ASAP

You are here: Home / Cyber Security News / Google Detects 4th Chrome Zero-Day in May Actively Under Attack – Update ASAP

Google on Thursday rolled out fixes to handle a substantial-severity security flaw in its Chrome browser that it reported has been exploited in the wild.

Assigned the CVE identifier CVE-2024-5274, the vulnerability relates to a form confusion bug in the V8 JavaScript and WebAssembly engine. It was reported by Clément Lecigne of Google’s Threat Examination Team and Brendon Tiszka of Chrome Security on May perhaps 20, 2024.

Kind confusion vulnerabilities arise when a program makes an attempt to accessibility a resource with an incompatible variety. It can have serious consequences as it enables risk actors to execute out-of-bounds memory entry, result in a crash, and execute arbitrary code.

The improvement marks the fourth zero-working day that Google has patched because the begin of the thirty day period soon after CVE-2024-4671, CVE-2024-4761, and CVE-2024-4947.

The tech huge did not disclose added specialized facts about the flaw, but acknowledged that it “is mindful that an exploit for CVE-2024-5274 exists in the wild.” It is not apparent if the shortcoming is a patch bypass for CVE-2024-4947, which is also a style confusion bug in V8.

With the newest take care of, Google has resolved a complete of 8 zero-times have been solved by Google in Chrome considering that the get started of the year –

  • CVE-2024-0519 – Out-of-bounds memory obtain in V8
  • CVE-2024-2886 – Use-following-absolutely free in WebCodecs (shown at Pwn2Individual 2024)
  • CVE-2024-2887 – Variety confusion in WebAssembly (demonstrated at Pwn2Have 2024)
  • CVE-2024-3159 – Out-of-bounds memory entry in V8 (demonstrated at Pwn2Very own 2024)
  • CVE-2024-4671 – Use-after-cost-free in Visuals
  • CVE-2024-4761 – Out-of-bounds generate in V8
  • CVE-2024-4947 – Variety confusion in V8

End users are suggested to up grade to Chrome variation 125..6422.112/.113 for Windows and macOS, and edition 125..6422.112 for Linux to mitigate likely threats.

Consumers of Chromium-primarily based browsers this kind of as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to apply the fixes as and when they grow to be offered.

Uncovered this posting interesting? Observe us on Twitter  and LinkedIn to go through additional exceptional content material we publish.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Courtroom Software Backdoored to Deliver RustDoor Malware in Supply Chain Attack
Next Post: DevOps Dilemma: How Can CISOs Regain Control in the Age of Speed? »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
  • eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.