Users are happy to know they’re running an up-to-date and secure browser version including modern Web Platform features, browser features, and bug fixes at all times. One of Chrome’s most notable features is its ability to auto-update. # Auto-update: great for users, painful for developers Today, we’re announcing a change that hopefully eases some of this pain. At the same time, setting up an adequate browser testing environment is notoriously difficult, so much so that it’s consistently reported as a top web developer pain point. # Backgroundīrowser testing is a vital component of creating a high-quality web experience, regardless of whether it is done manually or automatically. Chrome for Testing has been created purely for browser automation and testing purposes, and is not suitable for daily browsing. The full details can be found in the Google Chrome Releases blog. ![]() It does, however, put fixes in place for no less than seven security issues, five of which have a high criticality rating. I mention ChromeOS as, yes you’ve guessed it, there’s been a security update for this as well.īefore you panic too much, the ChromeOS update is not addressing the CVE-2023-3079 zero-day. This is the operating system that powers Chromebooks, one of the most affordable and secure ‘out of the box’ portable devices you can buy. Restart Brave and check that this is the case.Īnd while we are talking all things Chrome, and the apparent confusion that exists for some people when it comes to the browser, other browsers using the same technology that sits under the hood, I have to throw ChromeOS into the mix. When it comes to Brave, the browser version you are looking for is 1.52.122 which should have downloaded automatically. Go to settings|about and if your browser version is 1.41 or higher, it is no longer vulnerable to the CVE-2023-3079 issue. As with Google Chrome, users are advised to check to be sure. So, it looks like Opera users may have to wait a while longer for protection against this potentially very harmful exploit that’s already out there in the real world.Īs far as Microsoft Edge is concerned, the updated browser version number you are looking for is 1.41. First off the blocks was Vivaldi on June 5, followed by Microsoft Edge and Brave on June 6.Īt the time of writing, the Opera stable update blog was showing the last update for the browser was version. The good news is that there are updates to patch the CVE-2023-3079 issues already rolled out for most of the major Chromium-based browsers. The truth is that as CVE-2023-3079 is actually a type confusion vulnerability in the JavaScript V8 engine of Chromium, and multiple other browsers alongside Chrome itself as Chromium-based, then the answer is a resounding yes. Also, remember what I wrote earlier, and restart your browser after the update has been installed, or it will not activate, and you will still be vulnerable to attack.Ġ6/08 Update: A number of readers have got in touch with me to ask whether their non-Chrome web browsers are also impacted by this zero-day security vulnerability that is being exploited in the wild. It may take a few days for the update to reach everyone, so be patient if you are not seeing it yet. Head for the Help|About option in your Google Chrome menu, and if the update is available, it will automatically start downloading. MORE FROM FORBES Warning Issued For iPhone Users As iMessage 0-Click Attack Revealed By Davey Winder How to apply the Google Chrome security patch now ![]() “Users are strongly advised to promptly update their browsers to mitigate any potential risks,” Walters concludes. However, due to flaws in the implementation of type checking mechanisms, a malicious actor can deceive the JavaScript engine into treating a variable as a different type than it actually is.” The end result being that it’s possible for a malicious actor to potentially execute arbitrary code. This is because objects within the V8 engine are, Walters explains, “assigned types based on their underlying data type. “Type Confusion vulnerabilities pose a significant risk,” Walters says, “enabling attackers to execute arbitrary code on targeted machines by exploiting weaknesses in memory object handling.” It poses a significant risk, according to Mike Walters, vice-president of vulnerability and threat research at risk-based patch management specialists Action. CVE-2023-3079 poses a significant risk to users, expert saysĬVE-2023-3079 is the third zero-day of 2023 for Google Chrome. This latter point is crucial for those of you who tend to run with dozens of tabs open and rarely close the browser at all. ![]() However, to activate the update, you must restart the browser. The very act of going to check on your Chrome version number will kickstart a download and installation of the security update if it has reached you already. Which means that you shouldn’t play the waiting game, but instead go check that your browser has, indeed, been updated.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |