![]() Dark Reading notes that this is Chrome's fifth zero-day vulnerability disclosed in 2022. There are 10 other security fixes included in the update. Google says the update-1.101 for Mac and Linux and 1.102/101 for Windows-will "roll out over the coming days/weeks," but you can (and should) manually update Chrome now (check the "About" section of your settings). After a certain percentage of users have applied the relevant updates, those details may be revealed. Details of the exploit are currently tucked behind a wall in the Chromium bugs group and are restricted to those actively working on related components and registered with Chromium. The exploit was reported by Ashley Shen and Christian Resell of the Google Threat Analysis Group, and that's all the information we have for now. If you’re using the Material Design settings page (as I am in the screenshot below), this option is found under the. ![]() On the About page, you should see a Change Channel button under the Channel section. From there, click the About Chrome option. As noted by the Dark Reading blog, input validation is a common weakness in code. Open the Settings menu by clicking the system tray and then the gear icon. Intents are typically a way to pass data from inside Chrome to another application, such as the share button on Chrome's address bar. Google announced an update on Wednesday to the Stable channel of its Chrome browser that includes a fix for an exploit that exists in the wild.ĬVE-2022-2856 is a fix for "insufficient validation of untrusted input in Intents," according to Google's advisory.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |