Wednesday, February 26, 2025
HomeChromeChrome 131 Released with the Fix for Multiple Vulnerabilities

Chrome 131 Released with the Fix for Multiple Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

The Chrome team has officially announced the release of Chrome 131 for Windows, Mac, and Linux. The new version, Chrome 131.0.6778.69 for Linux and 131.0.6778.69/.70 for Windows and Mac is set to roll out to users over the coming days and weeks.

This update includes several security fixes, performance improvements, and other enhancements, making Chrome even more secure and efficient for its global user base.

As with every version update, Chrome 131 comes with several under-the-hood improvements.

While the full list of changes can be found in the official Chrome log, users can also look forward to upcoming blog posts from Chrome and Chromium that will outline new features and significant efforts delivered in this version.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

Security Fixes and Rewards

Security remains a top priority for Google, and Chrome 131 addresses multiple vulnerabilities to ensure safer browsing for users.

In total, 12 security issues have been fixed in this release, many of which were identified by external researchers.

Google will restrict access to the detailed bug reports until a majority of users have updated to the latest version to prevent potential exploitation.

If the vulnerabilities affect third-party libraries that other projects rely on, access to details may remain restricted.

Below is a detailed list of the security vulnerabilities addressed in Chrome 131, including the relevant CVE (Common Vulnerabilities and Exposures) identifiers, descriptions, severity levels, and who reported them.

CVE IDSeverityVulnerability DescriptionDate Reported
CVE-2024-11110HighInappropriate implementation in Blink2024-10-14
CVE-2024-11111MediumInappropriate implementation in Autofill2024-08-18
CVE-2024-11112MediumUse after free in Media2024-07-23
CVE-2024-11113MediumUse after free in Accessibility2024-08-16
CVE-2024-11114MediumInappropriate implementation in Views2024-10-02
CVE-2024-11115MediumInsufficient policy enforcement in Navigation2024-10-07
CVE-2024-11116MediumInappropriate implementation in Paint2023-11-14
CVE-2024-11117LowInappropriate implementation in FileSystem2023-01-06

In addition to the fixes contributed by external researchers, Google’s ongoing internal security efforts have played a crucial role in addressing various issues.

Through internal audits, fuzzing, and other initiatives, several vulnerabilities were identified and fixed before they could affect users.

Run private, Real-time Malware Analysis in both Windows & Linux VMs. Get a 14-day free trial with ANY.RUN!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

2,850+ Ivanti Connect Secure Devices Exposed to Potential Cyberattacks

A sweeping cybersecurity alert has emerged as researchers identify 2,850+ unpatched Ivanti Connect Secure devices worldwide,...

US Employee Background Check Firm Hacked, 3 Million Records Exposed

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services,...

Have I Been Pwned Reports Huge Data Leak, Adds 284 Million Stolen Accounts

Cybersecurity service Have I Been Pwned (HIBP) has disclosed one of the largest data...

Google Issues Warning on Phishing Campaigns Targeting Higher Education Institutions

Google, in collaboration with its Mandiant Threat Intelligence team, has issued a warning about...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

2,850+ Ivanti Connect Secure Devices Exposed to Potential Cyberattacks

A sweeping cybersecurity alert has emerged as researchers identify 2,850+ unpatched Ivanti Connect Secure devices worldwide,...

US Employee Background Check Firm Hacked, 3 Million Records Exposed

DISA Global Solutions, a Houston-based provider of employee background checks and workplace safety services,...

Have I Been Pwned Reports Huge Data Leak, Adds 284 Million Stolen Accounts

Cybersecurity service Have I Been Pwned (HIBP) has disclosed one of the largest data...