Google on Thursday shipped crisis patches to tackle two security issues in its Chrome web browser, just one of which it says is staying actively exploited in the wild.
Tracked as CVE-2022-1364, the tech giant described the high-severity bug as a scenario of style confusion in the V8 JavaScript motor. Clément Lecigne of Google’s Threat Assessment Team has been credited with reporting the flaw on April 13, 2022.
As is typically the scenario with actively exploited zero-working day flaws, the enterprise acknowledged it is “informed that an exploit for CVE-2022-1364 exists in the wild.” More particulars about the flaw and the identification of the risk actors have been withheld to prevent additional abuse.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
With the latest correct, Google has patched a full of a few zero-working day vulnerabilities in Chrome given that the start off of the year. It can be also the second type confusion-related bug in V8 to be squashed in considerably less than a month –
- CVE-2022-0609 – Use-after-absolutely free in Animation
- CVE-2022-1096 – Variety confusion in V8
Users are proposed to update to variation 100..4896.127 for Windows, Mac and Linux to thwart opportunity threats. Consumers of Chromium-primarily based browsers such as Microsoft Edge, Brave, Opera, and Vivaldi are also advised to use the fixes as and when they turn into offered.
Identified this write-up interesting? Abide by THN on Facebook, Twitter and LinkedIn to study additional unique material we submit.
Some sections of this short article are sourced from:
thehackernews.com