Reported by Mark Brand of Google Project Zero on High CVE-2023-4354: Heap buffer overflow in Skia. Reported by Christoph Diehl / Microsoft Vulnerability Research on High CVE-2023-4353: Heap buffer overflow in ANGLE. Reported by Sergei Glazunov of Google Project Zero on High CVE-2023-4352: Type Confusion in V8. Reported by Guang and Weipeng Jiang of VRI on High CVE-2023-4351: Use after free in Network. High CVE-2023-4350: Inappropriate implementation in Fullscreen. High CVE-2023-4349: Use after free in Device Trust Connectors. High CVE-2023-2312: Use after free in Offline. Please see the Chrome Security Page for more information. Below, we highlight fixes that were contributed by external researchers. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. A full list of changes in this build is available in the log. High CVE-2023-6345: Integer overflow in Skia.The Stable and Extended stable channels has been updated to 1.96 for Mac and Linux and 1.96/.97 for Windows, which will roll out over the coming days/weeks. High CVE-2023-6351: Use after free in libavif. High CVE-2023-6350: Out of bounds memory access in libavif. Reported by Huang Xilin of Ant Group Light-Year Security Lab on High CVE-2023-6346: Use after free in WebAudio. Reported by Leecraso and Guang Gong of 360 Vulnerability Research Institute on High CVE-2023-6347: Use after free in Mojo. High CVE-2023-6348: Type Confusion in Spellcheck. The Stable channel has been updated to 1.199 for Mac and Linux and 1.199/.200 for Windows, which will roll out over the coming days/weeks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |