Low CVE-2023-0139: Insufficient validation of untrusted input in Downloads. Low CVE-2023-0138: Heap buffer overflow in libphonenumber. ![]() Medium CVE-2023-0137: Heap buffer overflow in Platform Apps. Medium CVE-2023-0136: Inappropriate implementation in Fullscreen API. Medium CVE-2023-0135: Use after free in Cart. Medium CVE-2023-0134: Use after free in Cart. Medium CVE-2023-0133: Inappropriate implementation in Permission prompts. Reported by Jasper Rebane (popstonia) on Medium CVE-2023-0132: Inappropriate implementation in Permission prompts. Medium CVE-2023-0131: Inappropriate implementation in iframe Sandbox. Medium CVE-2023-0130: Inappropriate implementation in Fullscreen API. High CVE-2023-0129: Heap buffer overflow in Network Service. High CVE-2023-0128: Use after free in Overview Mode. Please see the Chrome Security Page for more information. ![]() Below, we highlight fixes that were contributed by external researchers. ![]() We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 109. This will roll out over the coming days/weeks.Ĭhrome 1.74 (linux), 1.74/.75( Windows) and 1.87 (Mac) contains a number of fixes and improvements - a list of changes is available in the log. The Chrome team is delighted to announce the promotion of Chrome 109 to the stable channel for Windows, Mac and Linux.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |