Zero-Day Vulnerability In Google: Do Not Forget To Update It!

Zero-Day Vulnerability In Google: Do Not Forget To Update It!

Written by Deepak Bhagat, In News, Published On
December 2, 2023

Recent updates to Google Chrome have resolved a vulnerability that enabled an assailant to execute harmful code on a user’s device by utilizing a malicious file. In this version,  the company has patched seven important security holes.

Google is distributing a security upgrade for the Chrome web browser. This patch fixes a vulnerability that allows unauthorized users to execute dangerous programs on devices. Google has fixed seven zero-day vulnerabilities this year, so users should install the latest Windows, macOS, and Linux updates to stay protected. After distributing the update to many users, the company will provide more specifics and here is the Link.

The update that started downloading to users earlier this week for macOS and Linux is Google Chrome 119.0.6045.199, according to Android Central. Simultaneously, Windows users also got version 119.0.6045.200, which fixed a zero-day vulnerability. Malicious individuals can take advantage of these vulnerabilities as the software’s creators were unaware of them before.

Google’s latest Chrome update fixes NIST’s CVE-2023-6345 security vulnerability. Although the corporation has not released anything about the security vulnerability, its most recent update release notes state that “an exploit for CVE-2023-6345 exists in the wild.” Chrome users should enable automatic updates or manually update for the latest changes.

Meanwhile, the NIST website lists the vulnerability as “High” in severity. Google Chrome uses the open-source Skia library, according to the documentation. An attacker might bypass the sandbox, which isolates the browser from the underlying system to protect it, by compromising the renderer process with a malicious file.

Google Chrome Recommends the Implementation of Manifest V3, Which Will Destroy Ad Blockers in 2024

The transition of Google Chrome to the Manifest V3 extension specification will be finalized in 2024, the organization wrote in a recent blog post. It is anticipated that the transition from the previous version to Chrome’s Manifest V3 will significantly restrict the functionality of extensions on the most popular web browser in the world, including several well-known ad blockers. Several other browsers that utilize the Chromium engine are anticipated to be impacted by Google’s modifications, whereas Firefox and Safari are unlikely to be impacted.

Also Read -   Nothing Phone 3: Pricing and Release Date Leaked!

The search engine behemoth recently updated the schedule for the migration to Manifest V3 for Google Chrome in a blog post. As per Google’s statement, certain modifications to the specification have been implemented to enhance user security by imposing restrictions on the access that ad-blocking extensions are granted to the browser and its functionality on a user’s computer. These modifications will affect how ad-blocking extensions interact with the browser.

Expected to discontinue support for Manifest V2 and complete the transition process by the end of the previous year, the company encountered significant opposition from privacy advocates, developers, and users dependent on extensions that the transition would impede. YouTube initiated a worldwide campaign against ad blockers more recently, prohibiting its users from accessing videos on the platform and increasing the cost of its ad-free YouTube Premium subscription in seven countries.

Related articles
Join the discussion!