漏洞已在外部被利用!請為Chrome瀏覽器更新0day補(bǔ)丁
Google已經(jīng)為他們的Chrome瀏覽器桌面用戶發(fā)布了一個緊急修復(fù)程序,以應(yīng)對最近發(fā)現(xiàn)的一個正在被積極利用的漏洞。CVE-2021-30563已經(jīng)被判定是Chrome的Javascript引擎V8中的一個類型混淆漏洞,但Google沒有公布有關(guān)該漏洞的更多細(xì)節(jié)。
Google已經(jīng)了解有報告說CVE-2021-30563的漏洞存在于外部,這使得它的危險性大大提高。
新的補(bǔ)丁會將Chrome瀏覽器升級到Windows、Mac和Linux的Chrome 91.0.4472.164,總共修補(bǔ)了其他七個安全漏洞。
修復(fù)的其他漏洞包括:
[$7500][1219082] High CVE-2021-30559: Out of bounds write in ANGLE. Reported by Seong-Hwan Park (SeHwa) of SecunologyLab on 2021-06-11
[$5000][1214842] High CVE-2021-30541: Use after free in V8. Reported by Richard Wheeldon on 2021-05-31
[$N/A][1219209] High CVE-2021-30560: Use after free in Blink XSLT. Reported by Nick Wellnhofer on 2021-06-12
[$TBD][1219630] High CVE-2021-30561: Type Confusion in V8. Reported by Sergei Glazunov of Google Project Zero on 2021-06-14
[$TBD][1220078] High CVE-2021-30562: Use after free in WebSerial. Reported by Anonymous on 2021-06-15
[$TBD][1228407] High CVE-2021-30563: Type Confusion in V8. Reported by Anonymous on 2021-07-12
[$TBD][1221309] Medium CVE-2021-30564: Heap buffer overflow in WebXR. Reported by Ali Merchant, iQ3Connect VR Platform on 2021-06-17
鑒于該漏洞在外部被利用,建議所有Chrome用戶盡快通過進(jìn)入設(shè)置>幫助>"關(guān)于Google瀏覽器"來更新以防止遭受攻擊。