Tuesday, April 8, 2025
Homecyber securityChrome 129 Released with Fix for Multiple Security Vulnerabilities

Chrome 129 Released with Fix for Multiple Security Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

The Chrome team has officially announced the release of Chrome 129, which is now available on the stable channel for Windows, Mac, and Linux.

This update, which will be gradually rolled out over the coming days and weeks, addresses several security vulnerabilities and introduces various improvements. Users are encouraged to update their browsers to benefit from these enhancements.

Key Security Fixes

Chrome 129.0.6668.58 for Linux and 129.0.6668.58/.59 for Windows and Mac includes nine security fixes, some of which were contributed by external researchers.

- Advertisement - Google News

The details of these fixes will remain restricted until most users have updated their browsers to ensure security across all platforms.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The following table highlights some of the key security issues addressed in this release:

SeverityCVE IDDescriptionRewardDate Reported
HighCVE-2024-8904Type Confusion in V8N/A2024-09-08
MediumCVE-2024-8905Inappropriate implementation in V8$80002024-08-15
MediumCVE-2024-8906Incorrect security UI in Downloads$20002024-07-12
MediumCVE-2024-8907Insufficient data validation in Omnibox$10002024-08-18
LowCVE-2024-8908Inappropriate implementation in Autofill$10002024-04-26
LowCVE-2024-8909Inappropriate implementation in UI$10002024-05-18

In addition to these externally reported issues, the Chrome team has implemented various internal security fixes through audits, fuzzing, and other initiatives.

The Chrome team continues prioritizing security by working with researchers and utilizing advanced tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL to detect vulnerabilities.

These efforts are part of an ongoing commitment to maintaining a secure browsing experience for all users. 

Users interested in exploring different release channels or reporting new issues can find more information on the Chrome Security Page or participate in the community help forum.

As always, the Chrome team appreciates the contributions of security researchers worldwide who help prevent vulnerabilities from reaching the stable channel.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Over 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Over 5,000 Ivanti Connect Secure devices remain vulnerable to a critical remote code execution...

CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an...

Over 26,000 Dark Web Discussions Focused on Hacking Financial Organizations

Radware’s comprehensive research into the cybersecurity landscape has uncovered significant trends shaping the financial...

Malicious VS Code Extensions with Millions of Installs Put Developers at Risk

A sophisticated cryptomining campaign has been uncovered, targeting developers through malicious Visual Studio Code...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Over 5,000 Ivanti Connect Secure Devices Exposed to RCE Vulnerabilities

Over 5,000 Ivanti Connect Secure devices remain vulnerable to a critical remote code execution...

CISA Alerts on Actively Exploited CrushFTP Authentication Bypass Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about an...

Over 26,000 Dark Web Discussions Focused on Hacking Financial Organizations

Radware’s comprehensive research into the cybersecurity landscape has uncovered significant trends shaping the financial...