Tuesday, March 25, 2025
Homecyber securityChrome 129 Released with Fix for Multiple Security Vulnerabilities

Chrome 129 Released with Fix for Multiple Security Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

The Chrome team has officially announced the release of Chrome 129, which is now available on the stable channel for Windows, Mac, and Linux.

This update, which will be gradually rolled out over the coming days and weeks, addresses several security vulnerabilities and introduces various improvements. Users are encouraged to update their browsers to benefit from these enhancements.

Key Security Fixes

Chrome 129.0.6668.58 for Linux and 129.0.6668.58/.59 for Windows and Mac includes nine security fixes, some of which were contributed by external researchers.

The details of these fixes will remain restricted until most users have updated their browsers to ensure security across all platforms.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The following table highlights some of the key security issues addressed in this release:

SeverityCVE IDDescriptionRewardDate Reported
HighCVE-2024-8904Type Confusion in V8N/A2024-09-08
MediumCVE-2024-8905Inappropriate implementation in V8$80002024-08-15
MediumCVE-2024-8906Incorrect security UI in Downloads$20002024-07-12
MediumCVE-2024-8907Insufficient data validation in Omnibox$10002024-08-18
LowCVE-2024-8908Inappropriate implementation in Autofill$10002024-04-26
LowCVE-2024-8909Inappropriate implementation in UI$10002024-05-18

In addition to these externally reported issues, the Chrome team has implemented various internal security fixes through audits, fuzzing, and other initiatives.

The Chrome team continues prioritizing security by working with researchers and utilizing advanced tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL to detect vulnerabilities.

These efforts are part of an ongoing commitment to maintaining a secure browsing experience for all users. 

Users interested in exploring different release channels or reporting new issues can find more information on the Chrome Security Page or participate in the community help forum.

As always, the Chrome team appreciates the contributions of security researchers worldwide who help prevent vulnerabilities from reaching the stable channel.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Ingress NGINX RCE Vulnerability Allows Attackers to Compromise Entire Cluster

A series of remote code execution (RCE) vulnerabilities known as "IngressNightmare" have been discovered...

Hackers Deploy Fake Semrush Ads to Steal Google Account Credentials

In a recent cybersecurity threat, hackers have been using fake Semrush ads to target...

Pocket Card Users Targeted in Sophisticated Phishing Campaign

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec....

Albabat Ransomware Expands Reach to Target Linux and macOS Platforms

A recent report from Trend Micro has revealed that a new variant of the...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ingress NGINX RCE Vulnerability Allows Attackers to Compromise Entire Cluster

A series of remote code execution (RCE) vulnerabilities known as "IngressNightmare" have been discovered...

Hackers Deploy Fake Semrush Ads to Steal Google Account Credentials

In a recent cybersecurity threat, hackers have been using fake Semrush ads to target...

Pocket Card Users Targeted in Sophisticated Phishing Campaign

A new phishing campaign targeting Japanese Pocket Card users has been uncovered by Symantec....