![]() Reported by Nan and Guang Gong of 360 Alpha Lab on ![]() High CVE-2022-1856: Use after free in User Education.High CVE-2022-1855: Use after free in Messaging.High CVE-2022-1854: Use after free in ANGLE.Critical CVE-2022-1853: Use after free in Indexed DB.Security Fixes and Rewards - This update includes 32 security fixes: High CVE-2023-6345: Integer overflow in Skia.Important to know! The offline installer links do not include the automatic update feature. High CVE-2023-6351: Use after free in libavif. High CVE-2023-6350: Out of bounds memory access in libavif. Reported by Huang Xilin of Ant Group Light-Year Security Lab on High CVE-2023-6346: Use after free in WebAudio. ![]() Reported by Leecraso and Guang Gong of 360 Vulnerability Research Institute on High CVE-2023-6347: Use after free in Mojo. Reported by Mark Brand of Google Project Zero on High CVE-2023-6348: Type Confusion in Spellcheck. Please see the Chrome Security Page for more information. Below, we highlight fixes that were contributed by external researchers. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. A full list of changes in this build is available in the log. The Stable channel has been updated to 1.199 for Mac and Linux and 1.199/.200 for Windows, which will roll out over the coming days/weeks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |