TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Chrome 0day is being exploited now for CVE-2022-1096; update immediately

265 点作者 gargarplex大约 3 年前

22 条评论

suigetsusake大约 3 年前
It looks like this impacts all chromium-based browsers [0] which might not be obvious (was not for me anyway)<p>[0] <a href="https:&#x2F;&#x2F;msrc.microsoft.com&#x2F;update-guide&#x2F;vulnerability&#x2F;CVE-2022-1096" rel="nofollow">https:&#x2F;&#x2F;msrc.microsoft.com&#x2F;update-guide&#x2F;vulnerability&#x2F;CVE-20...</a>
ainar-g大约 3 年前
Looks like these are the two commits, based on the issue number:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;v8&#x2F;v8&#x2F;commit&#x2F;0981e91a4f8692af337e2588562ad1504f4bffdc" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;v8&#x2F;v8&#x2F;commit&#x2F;0981e91a4f8692af337e2588562a...</a><p><a href="https:&#x2F;&#x2F;github.com&#x2F;v8&#x2F;v8&#x2F;commit&#x2F;a2cae2180a7a6d64ccdede44d730c9fbba690fb7" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;v8&#x2F;v8&#x2F;commit&#x2F;a2cae2180a7a6d64ccdede44d730...</a><p>Although there could be others.
评论 #30855313 未加载
评论 #30821759 未加载
评论 #30816956 未加载
tommiegannert大约 3 年前
Looks like 99.0.4844.84 is the release we want.<p><a href="https:&#x2F;&#x2F;chromereleases.googleblog.com&#x2F;2022&#x2F;03&#x2F;stable-channel-update-for-desktop_25.html" rel="nofollow">https:&#x2F;&#x2F;chromereleases.googleblog.com&#x2F;2022&#x2F;03&#x2F;stable-channel...</a>
评论 #30819229 未加载
评论 #30817266 未加载
评论 #30815996 未加载
_Nat_大约 3 年前
&gt; Not much is known, at least publicly, at this stage about CVE-2022-1096 other than it is a &quot;Type Confusion in V8.&quot; This refers to the JavaScript engine employed by Chrome.<p>Is there a safer JavaScript engine folks can use without having to worry about this sorta thing? Even if it&#x27;s slower, less compatible, more resource-intensive, etc.?<p>I feel like, in most cases, I could make due with JavaScript being 10x or even 100x slower, taking up 10x the RAM, lacking some uncommon features, and so forth -- if it meant being able to enable it without needing to worry about new zero-days.
评论 #30815473 未加载
评论 #30815093 未加载
评论 #30815288 未加载
评论 #30814867 未加载
评论 #30815021 未加载
评论 #30815351 未加载
评论 #30816344 未加载
评论 #30815540 未加载
评论 #30815140 未加载
评论 #30830662 未加载
评论 #30815770 未加载
mdb31大约 3 年前
Chromium-based versions of Microsoft Edge are also vulnerable: updating to 99.0.1150.55 fixes this CVE
gruez大约 3 年前
Is there a site&#x2F;service&#x2F;mailing list that provides notifications for critical&#x2F;RCE&#x2F;in-the-wild exploit patches? Keeping every piece of software you run up-to-date takes a lot of work, and something like that would help with knowing what to prioritize.
评论 #30815276 未加载
评论 #30830636 未加载
评论 #30815854 未加载
fn-mote大约 3 年前
I use snap for some applications in spite of the trouble it has caused me. I was super-happy to find out that it had upgraded me to a not-vulnerable verson of chromium before I even knew to look.<p>For all of the (deserved) hate snap gets, there are some shining up sides.
评论 #30815846 未加载
nathants大约 3 年前
securing a machine that is updated regularly and runs untrusted code is not realistic, monitoring network exfil is.<p>an exploit that cannot communicate is likely benign and easy to detect in the attempt.<p>monitor all outbound network connections with a gui prompt that defaults to deny. whitelist trusted domains&#x2F;ip for a better experience and a bit less security.<p>macos has littlesnitch[1], linux has opensnitch[2], or roll your own on libnetfilterqueue[3].<p>bonus points if the filtering happens upstream at a router or wireguard host so a compromised machine cannot easily disable filtering.<p>bonus points if the filtering is at executable level granularity instead of system level.<p>1. <a href="https:&#x2F;&#x2F;www.obdev.at&#x2F;products&#x2F;littlesnitch&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;www.obdev.at&#x2F;products&#x2F;littlesnitch&#x2F;index.html</a><p>2. <a href="https:&#x2F;&#x2F;github.com&#x2F;evilsocket&#x2F;opensnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;evilsocket&#x2F;opensnitch</a><p>3. <a href="https:&#x2F;&#x2F;github.com&#x2F;nathants&#x2F;tinysnitch" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;nathants&#x2F;tinysnitch</a>
评论 #30821479 未加载
t3odump大约 3 年前
I would like to analyze the issue of browser security without controversy. The mitigations that Edge puts into practice (I&#x27;m talking about &quot;Super Duper Secure&quot; and &quot;Enhanced Security&quot;) can prevent the operation of exploits in the V8 engine like this 0-day?<p>Is this platform dependent or the mitigation in progress works well? I mean for example some feature on mac and Linux is available out of the box asACG feature.<p>This analysis is very interesting because I have only read analisys related to privacy and not about security and integrity. (I mean compare between Chorme, Edge, Brave, etc ...)
janci大约 3 年前
Is Chrome for android affected? And V8 in nodejs?
buro9大约 3 年前
Type confusion in V8... May well impact Cloudflare workers too.
评论 #30815275 未加载
评论 #30816424 未加载
eezurr大约 3 年前
Anyone know if this affects Vivaldi? I assume it does since it&#x27;s chromium based, but there isn&#x27;t an update available.
评论 #30816131 未加载
bArray大约 3 年前
Just added a bug for the Ubuntu Chromium dev PPA to update their packages: <a href="https:&#x2F;&#x2F;bugs.launchpad.net&#x2F;ubuntu&#x2F;+source&#x2F;chromium-browser&#x2F;+bug&#x2F;1966572" rel="nofollow">https:&#x2F;&#x2F;bugs.launchpad.net&#x2F;ubuntu&#x2F;+source&#x2F;chromium-browser&#x2F;+...</a>
ruuda大约 3 年前
Type confusion in V8 ... Fortunately I turned off javascript by default since Meltdown&#x2F;Spectre.
评论 #30815744 未加载
amelius大约 3 年前
Is Electron at risk too?
评论 #30822596 未加载
评论 #30815080 未加载
sysOpOpPERAND大约 3 年前
why is chrome having so many updates within the past few months? is it because of coverage? (more users?). i use chrome off and on between that and firefox depending on the site and i am surprised how often i&#x27;ve been reading about issues with chrome.<p>should i switch browsers all together?
评论 #30825109 未加载
评论 #30819259 未加载
whatev1942大约 3 年前
What about CloudFlare ? Does this bring to question their decision to use V8 ?
paulpauper大约 3 年前
this just goes to show that updates are always 2 or so steps behind. It&#x27;s a near certainty that governments, top criminal organizations have a trove of exploits for all major programs, and new ones created after old ones get patched.
badrabbit大约 3 年前
Is there a public exploit for this? Working on detecting browser exploitation myself.
评论 #30815962 未加载
评论 #30815679 未加载
评论 #30817932 未加载
TT-392大约 3 年前
Anyone know if qutebrowser is affected?
评论 #30846993 未加载
评论 #30815748 未加载
评论 #30815745 未加载
baq大约 3 年前
Just what the doctor ordered in the middle of a war which is also waged in the information space. Hopefully the fact that it’s in v8 will take the exploit a bit longer than usual to proliferate.
评论 #30814878 未加载
octoberfranklin大约 3 年前
When the web &quot;standards&quot; are so insanely complicated that even Google can&#x27;t implement them securely, it&#x27;s time to admit that we have a problem.<p>When there is only one other complete implementation of these &quot;standards&quot; (with miniscule market share), it&#x27;s time to panic.
评论 #30815004 未加载
评论 #30814955 未加载
评论 #30814981 未加载