Cyber Security News

Chrome 129 Released with Fix for Multiple Security Vulnerabilities

The Chrome team has officially announced the release of Chrome 129, which is now available on the stable channel for Windows, Mac, and Linux.

This update, which will be gradually rolled out over the coming days and weeks, addresses several security vulnerabilities and introduces various improvements. Users are encouraged to update their browsers to benefit from these enhancements.

Key Security Fixes

Chrome 129.0.6668.58 for Linux and 129.0.6668.58/.59 for Windows and Mac includes nine security fixes, some of which were contributed by external researchers.

The details of these fixes will remain restricted until most users have updated their browsers to ensure security across all platforms.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

The following table highlights some of the key security issues addressed in this release:

SeverityCVE IDDescriptionRewardDate Reported
HighCVE-2024-8904Type Confusion in V8N/A2024-09-08
MediumCVE-2024-8905Inappropriate implementation in V8$80002024-08-15
MediumCVE-2024-8906Incorrect security UI in Downloads$20002024-07-12
MediumCVE-2024-8907Insufficient data validation in Omnibox$10002024-08-18
LowCVE-2024-8908Inappropriate implementation in Autofill$10002024-04-26
LowCVE-2024-8909Inappropriate implementation in UI$10002024-05-18

In addition to these externally reported issues, the Chrome team has implemented various internal security fixes through audits, fuzzing, and other initiatives.

The Chrome team continues prioritizing security by working with researchers and utilizing advanced tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL to detect vulnerabilities.

These efforts are part of an ongoing commitment to maintaining a secure browsing experience for all users. 

Users interested in exploring different release channels or reporting new issues can find more information on the Chrome Security Page or participate in the community help forum.

As always, the Chrome team appreciates the contributions of security researchers worldwide who help prevent vulnerabilities from reaching the stable channel.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Apache mod_auth_openidc Flaw Lets Unauthenticated Users Access Protected Data

A critical flaw in Apache mod_auth_openidc (versions ≤2.4.16.10) allows unauthenticated attackers to bypass authentication and access protected…

25 minutes ago

NCSC Issues Alert on MOONSHINE and BADBAZAAR Mobile Malware

GCHQ’s National Cyber Security Centre (NCSC), in collaboration with international and industry partners, has issued…

40 minutes ago

20 Best Incident Response Tools in 2025

In today's digital era, organizations face an ever-growing threat landscape, with cyberattacks, data breaches, and…

2 hours ago

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity vulnerability…

2 hours ago

Windows CLFS 0-Day Vulnerability Exploited in the Wild

Microsoft has disclosed an active exploitation of a zero-day vulnerability in the Windows Common Log…

2 hours ago

Kibana Releases Security Patch to Fix Code Injection Vulnerability

Elastic, the company behind Kibana, has released critical security updates to address a high-severity vulnerability…

3 hours ago