![]() ![]() ![]() ![]() The company hasn't shared any technical details or any info regarding these incidents. However, with the new Google Chrome update rolling out the bug is likely to get fixed. Google in one of its blog posts mentioned that the bug is already being exploited in the wild. Jan Vojtesek of the Avast Threat Intelligence team informed Google about this bug on Friday, July 1. The bug is a high severity heap-based buffer overflow weakness in the WebRTC (Web Real-Time Communications) component. This new update comes with a pair of security fixes, including a "type confusion" vulnerability designated as CVE-2022-2294. The Stable channel update introduced version 1.114 for users across the world. Google has issued a new Google Chrome update to patch the zero-day bug in the highly-used internet browser. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |