<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Chrome Zero-Day (CVE-2022-0609) Patch NOW! in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Chrome-Zero-Day-CVE-2022-0609-Patch-NOW/m-p/50294#M499</link>
    <description>&lt;P&gt;Great alert thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Folks need to keep in mind that&amp;nbsp;&lt;SPAN&gt;ALL Chromium based browsers affected - CHROME / EDGE / BRAVE / OPERA as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should upgrade to versions (build) listed below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Chrome: 99.0.4844.84&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Brave: 99.0.4844.88&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Edge: 99.0.1150.55&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Opera: 85.0.4341.18&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;</description>
    <pubDate>Mon, 28 Mar 2022 04:49:41 GMT</pubDate>
    <dc:creator>dcontesti</dc:creator>
    <dc:date>2022-03-28T04:49:41Z</dc:date>
    <item>
      <title>Chrome Zero-Day (CVE-2022-0609) Patch NOW!</title>
      <link>https://community.isc2.org/t5/Threats/Chrome-Zero-Day-CVE-2022-0609-Patch-NOW/m-p/50293#M498</link>
      <description>&lt;P&gt;Google's Threat Analysis Group discovered that two distinct North Korean government-backed attacker groups are exploiting a remote code execution vulnerability in Chrome, CVE-2022-0609. These groups' activity has been publicly tracked as Operation Dream Job and Operation AppleJeus.This flaw is a high severity use-after-free vulnerability in the Animation component of Chrome. Not much else is currently known about the bug. A use-after-free (UAF) exploit refers to memory after it has been freed, which can cause a program to use unexpected values, corrupt valid data, crash, or execute code, according to MITRE.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Reference: &lt;A href="https://blog.google/threat-analysis-group/countering-threats-north-korea/" target="_blank" rel="noopener"&gt;Countering threats from North Korea&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:08:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Chrome-Zero-Day-CVE-2022-0609-Patch-NOW/m-p/50293#M498</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T10:08:27Z</dc:date>
    </item>
    <item>
      <title>Re: Chrome Zero-Day (CVE-2022-0609) Patch NOW!</title>
      <link>https://community.isc2.org/t5/Threats/Chrome-Zero-Day-CVE-2022-0609-Patch-NOW/m-p/50294#M499</link>
      <description>&lt;P&gt;Great alert thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Folks need to keep in mind that&amp;nbsp;&lt;SPAN&gt;ALL Chromium based browsers affected - CHROME / EDGE / BRAVE / OPERA as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should upgrade to versions (build) listed below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Chrome: 99.0.4844.84&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Brave: 99.0.4844.88&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Edge: 99.0.1150.55&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Opera: 85.0.4341.18&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2022 04:49:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Chrome-Zero-Day-CVE-2022-0609-Patch-NOW/m-p/50294#M499</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2022-03-28T04:49:41Z</dc:date>
    </item>
  </channel>
</rss>

