

Low CVE-2023-0141: Insufficient policy enforcement in CORS. Low CVE-2023-0140: Inappropriate implementation in File System API. Low CVE-2023-0139: Insufficient validation of untrusted input in Downloads. Low CVE-2023-0138: Heap buffer overflow in libphonenumber. Medium CVE-2023-0137: Heap buffer overflow in Platform Apps.

Medium CVE-2023-0136: Inappropriate implementation in Fullscreen API. Medium CVE-2023-0135: Use after free in Cart. Medium CVE-2023-0134: Use after free in Cart. Medium CVE-2023-0133: Inappropriate implementation in Permission prompts. Reported by Jasper Rebane (popstonia) on Medium CVE-2023-0132: Inappropriate implementation in Permission prompts. Medium CVE-2023-0131: Inappropriate implementation in iframe Sandbox. Medium CVE-2023-0130: Inappropriate implementation in Fullscreen API. High CVE-2023-0129: Heap buffer overflow in Network Service. High CVE-2023-0128: Use after free in Overview Mode. Please see the Chrome Security Page for more information. Below, we highlight fixes that were contributed by external researchers. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix.

Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 109. This will roll out over the coming days/weeks.Ĭhrome 1.74 (linux), 1.74/.75( Windows) and 1.87 (Mac) contains a number of fixes and improvements - a list of changes is available in the log. The Chrome team is delighted to announce the promotion of Chrome 109 to the stable channel for Windows, Mac and Linux.
