• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google chrome adds v8 sandbox a new defense against

Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks

You are here: Home / General Cyber Security News / Google Chrome Adds V8 Sandbox – A New Defense Against Browser Attacks
April 8, 2024

Google has introduced help for what is actually referred to as a V8 Sandbox in the Chrome web browser in an work to tackle memory corruption issues.

The sandbox, according to V8 Security technological lead Samuel Groß, aims to prevent “memory corruption in V8 from spreading within just the host system.”

The lookup behemoth has explained V8 Sandbox as a light-weight, in-system sandbox for the JavaScript and WebAssembly engine which is made to mitigate common V8 vulnerabilities.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The concept is to limit the impact of V8 vulnerabilities by proscribing the code executed by V8 to a subset of the process’ virtual deal with area (“the sandbox”) and isolating it from the relaxation of the process.

Cybersecurity

Shortcomings impacting V8 have accounted for a important chunk of the zero-day vulnerabilities that Google has addressed amongst 2021 and 2023, with as several as 16 security flaws identified above the time time period.

“The sandbox assumes that an attacker can arbitrarily and concurrently modify any memory inside of the sandbox handle room as this primitive can be constructed from standard V8 vulnerabilities,” the Chromium team said.

“More, it is assumed that an attacker will be capable to read through memory outside the house of the sandbox, for example, as a result of components aspect channels. The sandbox then aims to defend the relaxation of the process from such an attacker. As these kinds of, any corruption of memory outside of the sandbox handle room is thought of a sandbox violation.”

Groß emphasised the challenges with tackling V8 vulnerabilities by switching to a memory-risk-free language like Rust or hardware memory security methods, this kind of as memory tagging, presented the “delicate logic issues” that can be exploited to corrupt memory, unlike vintage memory safety bugs like use-following-frees, out-of-bounds accesses, and other folks.

Chrome V8 Sandbox

“Just about all vulnerabilities found and exploited in V8 nowadays have 1 detail in frequent: the eventual memory corruption always comes about inside the V8 heap mainly because the compiler and runtime (just about) completely function on V8 HeapObject cases,” Groß claimed.

Provided that these issues can not be secured by the very same techniques used for regular memory-corruption vulnerabilities, the V8 Sandbox is developed to isolate V8’s heap memory this sort of that need to any memory corruption arise, it are not able to escape the security confines to other pieces of the process’ memory.

This is attained by replacing all data varieties that can obtain out-of-sandbox memory with “sandbox-appropriate” alternate options, thereby successfully blocking an attacker from accessing other memory. The sandbox can be enabled by location “v8_permit_sandbox” to legitimate in the gn args.

Benchmark benefits from Speedometer and JetStream demonstrate that the security feature provides an overhead of about 1% on typical workloads, allowing it to be enabled by default starting with Chrome edition 123, spanning Android, ChromeOS, Linux, macOS, and Windows.

“The V8 Sandbox necessitates a 64-bit method as it demands to reserve a substantial volume of digital address area, currently a person terabyte,” Groß stated.

Cybersecurity

“The sandbox is determined by the point that latest memory security systems are mostly inapplicable to optimizing JavaScript engines. Even though these systems are unsuccessful to avert memory corruption in V8 by itself, they can in truth protect the V8 Sandbox attack surface. The sandbox is as a result a essential stage towards memory security.”

The growth will come as Google highlighted the role by Kernel Deal with Sanitizer (KASan) in detecting memory bugs in native code and assist harden Android firmware security, adding it used the compiler-dependent tool for finding more than 40 bugs.

“Using KASan enabled builds in the course of screening and/or fuzzing can support catch memory corruption vulnerabilities and stability issues ahead of they land on person products,” Eugene Rodionov and Ivan Lozano from the Android team said.

Found this report attention-grabbing? Comply with us on Twitter  and LinkedIn to study a lot more exceptional information we submit.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «watch out for 'latrodectus' this malware could be in Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox
Next Post: Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks critical flaws leave 92,000 d link nas devices vulnerable to malware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.