The latest Chrome zero-day—labeled CVE-2025-5419—is an out-of-bounds read-and-write vulnerability that affects the V8 JavaScript engine, which would allow a remote attacker to "exploit heap corruption via a crafted HTML page."
The flaw was discovered and reported on May 27 by Clement Lecigne and BenoƮt Sevens from the Google Threat Analysis Group. While Google has acknowledged that the zero-day has been actively exploited, it hasn't disclosed any additional details as to how or by whom to prevent other bad actors from leveraging the bug until more Chrome users have applied the patch.
Google has confirmed that it pushed a configuration change to the Stable version of Chrome to address the vulnerability the day after it was discovered. On Monday, the company released a Stable channel update with patches for the zero-day and two additional security issuesUsers should ensure they are on Chrome version 137.0.7151.68/.69 for Windows and macOS, and version 137.0.7151.68 for Linux. Check your version by opening the Chrome menu and selecting About Google Chrome. If an update is available, allow it to complete and relaunch your browser to install it.
No comments:
Post a Comment