
This package is maintained by an automated update script on travis. The installer supports linux, mac and windows operating systems. In 2022, the number of known open source vulnerabilities rose by 4% from 2021, according to a report by Synopsys.Downloads and installs the latest chromedriver binary version for automated testing of webapps. Last year, 9 zero-day vulnerabilities were identified in Chrome. "By convincing a user to visit a specially crafted Web site, a remote attacker could ultimately achieve arbitrary code execution or cause a denial of service on the system," NSFocus said. In December, Google released an update for Chrome after a different type confusion vulnerability in V8 was identified.Ī type confusion error occurs when a program uses one type of method to allocate or initialize a resource but uses another method to access that resource, leading to an out-of-bounds memory access, according to cybersecurity firm NSFocus, in an alert it sent about Chrome's December update. This is the first zero-day vulnerability reported in Chrome this year. In addition to fixing CVE-2023-2033, the Chrome update also fixes a variety of issues detected during internal audits and other initiatives, the company said. Once the update is complete, users need to restart the browser.Ĭlement Lecigne of Google's Threat Analysis Group identified the vulnerability and reported the issue on April 11.

Chrome will automatically check for browser updates and, by default, update the browser. To update Chrome, users can click the overflow menu on the right side of the menu bar and then go to Help and About Google Chrome. “Access to bug details and links may be kept restricted until a majority of users are updated with a fix,” Google said in the statement. Google is yet to release complete details on the vulnerability. “Type confusion in V8 in Google Chrome prior to 1.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page,” NIST said. agency that runs the National Vulnerability Database, went further in its CVE description about the vulnerability. "Google is aware that an exploit for CVE-2023-2033 exists in the wild," the company said in a statement on April 14.


The high-severity vulnerability was described by Google as a "type confusion" issue in the V8 JavaScript engine. Google Chrome V8 is Google’s open source JavaScript and WebAssembly engine.
