Google on Friday announced an emergency Chrome 108 update to patch a zero-day vulnerability in the browser, the ninth to be fixed this year.
The high-severity security bug is tracked as CVE-2022-4262 and is described as a type confusion in the browser’s V8 JavaScript engine.
“Google is aware that an exploit for CVE-2022-4262 exists in the wild,” the internet giant says.
The vulnerability was identified by Google Threat Analysis Group security researcher Clement Lecigne. Per Google’s policy, no bug bounty reward will be paid.
The flaw could allow “a remote attacker to potentially exploit heap corruption via a crafted HTML page,” a National Vulnerability Database advisory explains.
Type confusion flaws exist because a block of memory is used by a different algorithm than the one that was supposed to consume it.
In Chrome, such issues could lead to deliberate code flow deviations, allowing attackers to achieve remote code execution (RCE) when untrusted code is served from a malicious page.
Patches for this vulnerability have been included in Chrome 108.0.5359.94 for Mac and Linux, and in Chrome 108.0.5359.94/.95 for Windows. Users are advised to update to a patched iteration as soon as possible.
This emergency Chrome update arrived just days after Google released Chrome 108 with patches for 28 vulnerabilities. None of these was known to be exploited in attacks.
The week before, on Thanksgiving Day, Google released another emergency Chrome update, to resolve a zero-day vulnerability in the GPU component. The issue is tracked as CVE-2022-4135.
Starting July, Google has been patching one Chrome zero-day per month. The exploitation of the July flaw was linked to Israeli spyware company Candiru.
Related: Chrome 108 Patches High-Severity Memory Safety Bugs
Related: Google Pays $45,000 for High-Severity Vulnerabilities Found in Chrome
Related: Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107

More from Ionut Arghire
- 820k Impacted by Data Breach at Zacks Investment Research
- US Government Agencies Warn of Malicious Use of Remote Management Software
- Chinese Hackers Adopting Open Source ‘SparkRAT’ Tool
- CISA Provides Resources for Securing K-12 Education System
- Strata Raises $26 Million for Multi-Cloud Identity Management Platform
- Riot Games Says Source Code Stolen in Ransomware Attack
- Arm Vulnerability Leads to Code Execution, Root on Pixel 6 Phones
- Attacks Targeting Realtek SDK Vulnerability Ramping Up
Latest News
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
- Tenable Launches $25 Million Early-Stage Venture Fund
- 820k Impacted by Data Breach at Zacks Investment Research
- Mapping Threat Intelligence to the NIST Compliance Framework Part 2
- Hive Ransomware Operation Shut Down by Law Enforcement
- US Government Agencies Warn of Malicious Use of Remote Management Software
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
