![]() We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.Īs usual, our ongoing internal security work was responsible for a wide range of fixes: Low CVE-2024-1676: Inappropriate implementation in Navigation. Medium CVE-2024-1675: Insufficient policy enforcement in Download. Medium CVE-2024-1674: Inappropriate implementation in Navigation. Medium CVE-2024-1673: Use after free in Accessibility. Reported by Georg Felber (TU Wien) & Marco Squarcina (TU Wien) on Medium CVE-2024-1672: Inappropriate implementation in Content Security Policy. Medium CVE-2024-1671: Inappropriate implementation in Site Isolation. High CVE-2024-1670: Use after free in Mojo. ![]() High CVE-2024-1669: Out of bounds memory access in Blink. Please see the Chrome Security Page for more information. ![]() ![]() Below, we highlight fixes that were contributed by external researchers. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed. Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |