Monday, April 7, 2025
HomeChromeChrome 78 Released: Added DNS-Over-HTTPS, Dark Mode and Fixed 37 Security Vulnerabilities

Chrome 78 Released: Added DNS-Over-HTTPS, Dark Mode and Fixed 37 Security Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Google released Chrome 78 with the various new feature, improvements such as dark mode and fixes for 37 security vulnerabilities that affected the earlier version of Chrome.

Chrome 78.0.3904.70, a stable channel now available for Android, Windows, Mac, and Linux. Google scheduled to roll out Chrome 79 on October 31 as a Beta version.

Google added and removed various features in this Chrome 78 update including Close other tabs” option removed, DNS-Over-HTTPS (DoH) Trial, Forced Dark Mode experiment, Integrated Password Checkup Tool and more.

- Advertisement - Google News

DNS-Over-HTTPS (DoH) Trial

Google announced DNS-over-HTTPS on September 10 and planned to launch Chrome 77. Due to some technical issues, the release postponed to Chrome 78.

DoH brings strong privacy for Chrome users and it runs on all supported platforms except Linux and iOS.

By enabling DoH, all DNS resolutions occur over an encrypted channel, helping to further safeguard user security and privacy.

For example, when we connected on a public WiFi, DoH would prevent other WiFi users from seeing which websites you visit, as well as prevent potential spoofing or pharming attacks.”

Google experimented with the DoH in the following providers.

  • Cleanbrowsing
  • Cloudflare
  • DNS.SB
  • Google
  • OpenDNS
  • Quad9

Forced Dark Mode experiment

Google added Forced Dark mode feature in this update and the user can enable dark mode for any website.

You can enable the “Force Dark Mode for Web Contents” flag at chrome://flags/#enable-force-dark and choose “Enabled with selective inversion of non-image elements” that works in a better way.

“Close Other Tabs” Option Removed

Google removed “Close other tabs” options along with other options including ”  ‘Reopen closed tab’, ” ‘New tab’ “, and added the ”  “New tabs to the right”.

Old Version options
New version options

37 Security Vulnerabilities

Totally, 37 security vulnerabilities are fixed. here some fixed vulnerability details reported by external security researchers.

High CVE-2019-13699: Use-after-free in media. Reported by Man Yue Mo of Semmle Security Research Team
High CVE-2019-13700: Buffer overrun in Blink. Reported by Man Yue Mo of Semmle Security Research Team
High CVE-2019-13701: URL spoof in navigation. Reported by David Erceg on 2019-08-27
Medium CVE-2019-13702: Privilege elevation in Installer. Reported by Phillip Langlois (phillip.langlois@nccgroup.com) and Edward Torkington
Medium CVE-2019-13703: URL bar spoofing. Reported by Khalil Zhani on 2019-08-12
Medium CVE-2019-13704: CSP bypass. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research on 2019-09-05
Medium CVE-2019-13705: Extension permission bypass. Reported by Luan Herrera
Medium CVE-2019-13706: Out-of-bounds read in PDFium. Reported by pdknsk
Medium CVE-2019-13707: File storage disclosure. Reported by Andrea Palazzo
Medium CVE-2019-13708: HTTP authentication spoof. Reported by Khalil Zhani 
Medium CVE-2019-13709: File download protection bypass. Reported by Zhong Zhaochen of andsecurity.cn
Medium CVE-2019-13710: File download protection bypass. Reported by bernardo.mrod 
Medium CVE-2019-13711: Cross-context information leak. Reported by David Erceg 
Medium CVE-2019-15903: Buffer overflow in expat. Reported by Sebastian Pipping 
Medium CVE-2019-13713: Cross-origin data leak. Reported by David Erceg 
Low CVE-2019-13714: CSS injection. Reported by Jun Kokatsu, Microsoft Browser Vulnerability Research
Low CVE-2019-13715: Address bar spoofing. Reported by xisigr of Tencent’s Xuanwu Lab
Low CVE-2019-13716: Service worker state error. Reported by Barron Hagerman 
Low CVE-2019-13717: Notification obscured. Reported by xisigr of Tencent’s Xuanwu Lab 
Low CVE-2019-13718: IDN spoof. Reported by Khalil Zhani
Low CVE-2019-13719: Notification obscured. Reported by Khalil Zhani

How to Update

Steps to update for Windows, Mac, and Linux desktop users

  1. Open Chrome browser
  2. Head to Settings
  3. Expand help
  4. About Google Chrome
  5. The browser will process the update

Android and iOS users can update the Chrome browser app from their respective App stores.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

MediaTek Releases Security Patch to Fix Vulnerabilities in Mobile and IoT Devices

MediaTek, a prominent semiconductor company specializing in mobile, IoT, and multimedia chipsets, has announced...

Lazarus Adds New Malicious npm Using Hexadecimal String Encoding to Evade Detection Systems

North Korean state-sponsored threat actors associated with the Lazarus Group have intensified their Contagious...

Python JSON Logger Vulnerability Enables Remote Code Execution – PoC Released

A recent security disclosure has revealed a remote code execution (RCE) vulnerability, CVE-2025-27607, in...