Google对他们来说Chrome浏览器桌面用户发布紧急修复程序,以应对最近发现的一个积极利用的漏洞。CVE-2021-30563已被判定为Chrome的Javascript引擎V8混淆漏洞的类型之一,但Google更多关于漏洞的细节尚未公布。
Google据了解,有报告说CVE-2021-30563外部存在漏洞,大大提高了其风险。
新补丁会Chrome升级到浏览器Windows、Mac和Linux的Chrome 91.0.4472.164,共修复了其他七个安全漏洞。
其他修复的漏洞包括:
- [$7500][1219082] High CVE-2021-30559: Out of bounds write in ANGLE. Reported by Seong-Hwan Park (SeHwa) of SecunologyLab on 2021-06-11
- [$5000][1214842] High CVE-2021-30541: Use after free in V8. Reported by Richard Wheeldon on 2021-05-31
- [$N/A][1219209] High CVE-2021-30560: Use after free in Blink XSLT. Reported by Nick Wellnhofer on 2021-06-12
- [$TBD][1219630] High CVE-2021-30561: Type Confusion in V8. Reported by Sergei Glazunov of Google Project Zero on 2021-06-14
- [$TBD][1220078] High CVE-2021-30562: Use after free in WebSerial. Reported by Anonymous on 2021-06-15
- [$TBD][1228407] High CVE-2021-30563: Type Confusion in V8. Reported by Anonymous on 2021-07-12
- [$TBD][1221309] Medium CVE-2021-30564: Heap buffer overflow in WebXR. Reported by Ali Merchant,iQ3Connect VR Platform on 2021-06-17
鉴于漏洞在外部使用,建议所有漏洞都使用Chrome用户尽快通过进入设置>帮助>"关于Google浏览器"更新以防止攻击。