Security News > 2022 > April > Yet another Chrome zero-day emergency update – patch now!
For the third time this year, Google's Chrome browser has quietly received a security update together with the dreaded words, "Google is aware that an exploit [] exists in the wild."
We're not aware of any follow-up report for last month's emergency patch - it's possible, after all, that Google simply hasn't traced the second lot of attacks back to their source yet.
Integer value giving width of cursor icon integer value giving height of cursor icon string of width height bytes denoting icon transparency.
For a 16×16 pixel icon, assuming 8 bytes for each of the two integers, this gives you a way to encode a precise pattern of up to 8 + 8 + 256 = 272 bytes in a memory block used by the app to represent an icon object.
Integer value giving number of iterations to try integer value giving size of output to create memory pointer to function called to generate each data value memory pointer denoting where to output the generated data.
Google has published two relevant security advisories: one for Windows, Mac and Linux, and a second but largely identical bulletin for Android.
News URL
https://nakedsecurity.sophos.com/2022/04/16/yet-another-chrome-zero-day-emergency-update-patch-now/
Related news
- New Chrome zero-day actively exploited, patch quickly! (CVE-2024-7971) (source)
- Microsoft August 2024 Patch Tuesday fixes 9 zero-days, 6 exploited (source)
- Google fixes ninth Chrome zero-day exploited in attacks this year (source)
- Google fixes ninth Chrome zero-day tagged as exploited this year (source)
- Week in review: PostgreSQL databases under attack, new Chrome zero-day actively exploited (source)
- Google tags a tenth Chrome zero-day as exploited this year (source)
- North Korean hackers exploit Chrome zero-day to deploy rootkit (source)
- North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit (source)
- New Chrome Zero-Day (source)
- Microsoft September 2024 Patch Tuesday fixes 4 zero-days, 79 flaws (source)