![]() ![]() If you find a new issue, please let us know by filing a bug. Interested in switching release channels? Find out how here. Google is aware that an exploit for CVE-2023-5217 exists in the wild.Īs usual, our ongoing internal security work was responsible for a wide range of fixes: We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. High CVE-2023-5187: Use after free in Extensions. High CVE-2023-5186: Use after free in Passwords. Reported by Clément Lecigne of Google's Threat Analysis Group on High CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx. ![]() Please see the Chrome Security Page for more information. Below, we highlight fixes that were contributed by external researchers. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. A full list of changes in this build is available in the log. ![]() The Stable channel has been updated to 1.132 for Windows, Mac and Linux, which will roll out over the coming days/weeks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |