Serious Discussion Google Chrome Stable Channel Updates

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
8,061
Prepare your extension as we begin testing a new extensions menu | Blog | Chrome for Developers

What's changing?​

To give users more control, we will introduce a new extensions menu. Extensions will continue to be granted access to all requested hosts at install time, but users will now have an easier way to control access per extension.
Work in progress design for the new extensions menu
Work in progress design for the new extensions menu
The new menu (pictured with the current design which may change) more clearly shows which extensions can run on a page, and gives users the ability to change access if chosen. A user can also prevent all extensions from running on a specific site. As mentioned, none of the available settings or defaults are changing–we are focused on making what we already have easier for users to discover.

Add a site access request​

Note: Following feedback in the WebExtensions Community Group, this API was renamed from permissions.addSiteAccessRequest to permissions.addHostAccessRequest. This change was made before the API shipped to the beta or stable channels so you can safely rely on the new name.
We have designed a new API to complement these changes, with significant input from other browsers and developers in the WebExtensions Community Group.
If a user has withheld access to a page, extensions can now request access using the new permissions.addHostAccessRequest API. When an extension does this, the user will see an "Allow" message alongside the extension puzzle piece in the toolbar. Here's one design we are exploring:
A site access request on example.com
A site access request on example.com
When a user clicks "Allow" within the extensions menu, the extension is granted persistent access to the host. The user can withhold it again in the future by accessing the extensions menu or on the chrome://extensions page. Clicking "Allow 1?" within the toolbar provides a faster way to grant immediate access.
Extensions can call permissions.addHostAccessRequest with a tabId to show a permission request for that tab. You can use feature detection to safely begin using it in your extension today. The API won't do anything for users without the new menu, but adopting it will benefit users with the new menu as it is gradually rolled out.


chrome.tabs.onUpdated.addListener(async (tabId, changes) => {
if (typeof changes.url !== 'string') return;

const url = new URL(changes.url);

// If we are on the /checkout page of example.com.
if (url.origin === 'Example Domain' && url.pathname === '/checkout') {
const hasPermission = await chrome.permissions.contains({
origins: ['https://example.com/*']
});

// We already have host permissions.
if (hasPermission) {
return;
}

// Add a site access request if the API is available.
if (chrome.permissions.addHostAccessRequest) {
chrome.permissions.addHostAccessRequest({ tabId });
}
}
});

In this example, we only add a request if the user is on the /checkout page. You can see the full code in our chrome-extensions-samples repository.
Extensions should be mindful about when to ask users for access. Users are more likely to ignore noisy requests and Chrome might throttle excessive requests. A user can also choose to turn off the ability for an extension to show requests. As a result, you should only request access in specific situations, when you have high confidence the user will want to engage with your extension.
Requests are bound to a specific tab and are automatically cleared when a user navigates to a different origin. A corresponding removeHostAccessRequest method is available to clear a request explicitly (such as if a request is bound to a particular path).
Since this API is linked with the new extensions menu, calls will be ignored if the new menu is not enabled. However, we encourage you to try the API today, and consider adopting it in your extension. You'll provide a great user experience as the new menu changes gradually show for more users.
To learn more about working with optional permissions, check out the permissions documentation.

Try it out​

The API is enabled by default in Chrome 133.0.6860.0 and higher (currently in Chrome Canary). To enable the new menu, at chrome://flags, enable the "Extensions Menu Access Control" flag.
As a reminder, this is still work in progress and may continue to evolve and change. We recommend testing in Chrome Canary to see the most up to date experience.
You can leave feedback on the new design in the chromium-extensions mailing list which we'll be keeping in mind as we continue work on the new menu.
 

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
8,061
I enabled the Extensions Menu Access Control flag and am starting to like this feature. It allows control of multiple extensions with these options from the toolbar:
  • Ask on every visit
  • Always on "website name"
  • Always on all sites
These options allow you to run, e.g., multiple adblockers, etc. and have one or the other run when you want, and in the case of option #2, needing only a click and page reload. In the case of adblockers, users can have one aggressive and one relaxed, which may be enabled when needed based on your surfing habits.

Edge includes this feature by default, and doesn't have this flag. IIRC, this feature has been in Edge for quite some time, but I forgot it was there.
 
Last edited:

oldschool

Level 85
Verified
Top Poster
Well-known
Mar 29, 2018
8,061

Stable Channel Update for Desktop

Wednesday, December 18, 2024
The Stable channel has been updated to 131.0.6778.204/.205 for Windows, Mac and 131.0.6778.204 for Linux which will roll out over the coming days/weeks. A full list of changes in this build is available in the Log.

Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 5 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$55000][382291459] High CVE-2024-12692: Type Confusion in V8. Reported by Seunghyun Lee (@0x10n) on 2024-12-05
[$20000][382190919] High CVE-2024-12693: Out of bounds memory access in V8. Reported by 303f06e3 on 2024-12-04
[TBD][368222741] High CVE-2024-12694: Use after free in Compositing. Reported by Anonymous on 2024-09-19
[TBD][383647255] High CVE-2024-12695: Out of bounds write in V8. Reported by 303f06e3 on 2024-12-12

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:
  • [384734545] Various fixes from internal audits, fuzzing and other initiatives
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 131.0.6778.264/.265 Stable Channel Update for Desktop
The Stable channel has been updated to 131.0.6778.264/.265 for Windows, Mac and 131.0.6778.264 for Linux which will roll out over the coming days/weeks.

This update includes 4 security fixes. Below, we highlight fixes that were contributed by external researchers.

[$55000][383356864] High CVE-2025-0291: Type Confusion in V8. Reported by Popax21 on 2024-12-11
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 132.0.6834.110/111 Stable Channel Update for Desktop
The Stable channel has been updated to 132.0.6834.110/111 for Windows, Mac and 132.0.6834.110 for Linux which will roll out over the coming days/weeks.

This update includes 3 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$11000][386143468] High CVE-2025-0611: Object corruption in V8. Reported by 303f06e3 on 2024-12-26
[$8000][385155406] High CVE-2025-0612: Out of bounds memory access in V8. Reported by Alan Goodman on 2024-12-20
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 132.0.6834.159/160 Stable Channel Update for Desktop
The Stable channel has been updated to 132.0.6834.159/160 for Windows, Mac and 132.0.6834.159 for Linux which will roll out over the coming days/weeks.

This update includes 2 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$2000][384844003] Medium CVE-2025-0762: Use after free in DevTools. Reported by Sakana.S on 2024-12-18
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 133.0.6943.53/54 Stable Channel Update for Desktop
The Chrome team is delighted to announce the promotion of Chrome 133 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.

Chrome 133.0.6943.53 (Linux) 133.0.6943.53/54( Windows, Mac) contains a number of fixes and improvements -- a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 133.

This update includes 12 security fixes. Below, we highlight fixes that were contributed by external researchers.

[$7000][390889644] High CVE-2025-0444: Use after free in Skia. Reported by Francisco Alonso (@revskills) on 2025-01-19
[TBD][392521083] High CVE-2025-0445: Use after free in V8. Reported by 303f06e3 on 2025-01-27
[$2000][40061026] Medium CVE-2025-0451: Inappropriate implementation in Extensions API. Reported by Vitor Torres and Alesandro Ortiz on 2022-09-18
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 33.0.6943.98/.99 Stable Channel Update for Desktop
The Stable channel has been updated to 133.0.6943.98/.99 for Windows, Mac and 133.0.6943.98 for Linux which will roll out over the coming days/weeks.

This update includes 4 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$55000][391907159] High CVE-2025-0995: Use after free in V8. Reported by Popax21 on 2025-01-24
[TBD][391788835] High CVE-2025-0996: Inappropriate implementation in Browser UI. Reported by yuki yamaoto on 2025-01-23
[TBD][391666328] High CVE-2025-0997: Use after free in Navigation. Reported by asnine on 2025-01-23
[TBD][386857213] High CVE-2025-0998: Out of bounds memory access in V8. Reported by Alan Goodman on 2024-12-31
 

silversurfer

Super Moderator
Verified
Top Poster
Staff Member
Malware Hunter
Aug 17, 2014
11,777
Google Chrome 133.0.6943.126/.127 Stable Channel Update for Desktop
The Stable channel has been updated to 133.0.6943.126/.127 for Windows, Mac and 133.0.6943.126 for Linux which will roll out over the coming days/weeks.

This update includes 3 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$11000][394350433] High CVE-2025-0999: Heap buffer overflow in V8. Reported by Seunghyun Lee (@0x10n) on 2025-02-04
[TBD][383465163] High CVE-2025-1426: Heap buffer overflow in GPU. Reported by un3xploitable && GF on 2024-12-11
[$4000][390590778] Medium CVE-2025-1006: Use after free in Network. Reported by Tal Keren, Sam Agranat, Eran Rom, Edouard Bochin, Adam Hatsir of Palo Alto Networks on 2025-01-18
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 133.0.6943.141/.142 Stable Channel Update for Desktop
The Stable channel has been updated to 133.0.6943.141/.142 for Windows, Mac and 133.0.6943.141 for Linux which will roll out over the coming days/weeks.

This update includes 3 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.

[$11000][394350433] High CVE-2025-0999: Heap buffer overflow in V8. Reported by Seunghyun Lee (@0x10n) on 2025-02-04
[TBD][383465163] High CVE-2025-1426: Heap buffer overflow in GPU. Reported by un3xploitable && GF on 2024-12-11
[$4000][390590778] Medium CVE-2025-1006: Use after free in Network. Reported by Tal Keren, Sam Agranat, Eran Rom, Edouard Bochin, Adam Hatsir of Palo Alto Networks on 2025-01-18
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 134.0.6998.35/36 Stable Channel Update for Desktop
The Chrome team is delighted to announce the promotion of Chrome 134 to the stable channel for Windows, Mac and Linux. This will roll out over the coming days/weeks.

Chrome 134.0.6998.35 (Linux) 134.0.6998.35/36 ( Windows) 134.0.6998.44/45 (Mac) contains a number of fixes and improvements -- a list of changes is available in the log. Watch out for upcoming Chrome and Chromium blog posts about new features and big efforts delivered in 134.

This update includes 14 security fixes. Below, we highlight fixes that were contributed by external researchers.

[$7000][397731718] High CVE-2025-1914: Out of bounds read in V8. Reported by Zhenghang Xiao (@Kipreyyy) and Nan Wang (@eternalsakura13) on 2025-02-20
[$4000][391114799] Medium CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in DevTools. Reported by Topi Lassila on 2025-01-20
[$3000][376493203] Medium CVE-2025-1916: Use after free in Profiles. Reported by parkminchan, SSD Labs Korea on 2024-10-31
[$2000][329476341] Medium CVE-2025-1917: Inappropriate Implementation in Browser UI. Reported by Khalil Zhani on 2024-03-14
[$2000][388557904] Medium CVE-2025-1918: Out of bounds read in PDFium. Reported by asnine on 2025-01-09
[$2000][392375312] Medium CVE-2025-1919: Out of bounds read in Media. Reported by @Bl1nnnk and @Pisanbao on 2025-01-26
[$1000][387583503] Medium CVE-2025-1921: Inappropriate Implementation in Media Stream. Reported by Kaiido on 2025-01-04
[$5000][384033062] Low CVE-2025-1922: Inappropriate Implementation in Selection. Reported by Alesandro Ortiz on 2024-12-14
[$1000][382540635] Low CVE-2025-1923: Inappropriate Implementation in Permission Prompts. Reported by Khalil Zhani on 2024-12-06
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Chrome 134 ships with security patches and new password change functionality
The new Chrome releases introduces a few new features and some changes that users need to be aware of.

Here are the highlights:
  • Semi-automated password change option: when users use the "check your password" dialog in Chrome, they may receive information about insecure passwords. Chrome 134 introduces a new feature to allow password changes on supported sites right in the dialog. The feature is not fully automated, but may speed up the process.
  • Reading mode in Chrome's sidebar supports "read aloud" functionality now.
  • Improved password form detection: Google says that it uses on-device machine learning to better "parse password forms on the web to increase detection and filling accuracy".
  • Unpacked extensions are only enabled in Chrome if Developer Mode is turned on. Google reasons that this is done to "will only be enabled if the developer mode switch is turned on. This change is intended to improve security by mitigating the risks associated with harmful unpacked extensions and developer mode tampering exploitation".
  • Chrome for Android may hide contents of notifications that "are suspected to be abusive". It uses on-device detection for that.
  • New Security & Privacy panel in the Developer Tools. This allows developers to test how sites behave when third-party cookies are limited. Developers may use the panel to test all different states (All, Blocked, Allowed, Allowed by Exception).
 

Gandalf_The_Grey

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
7,871
Google Chrome 134.0.6998.88/.89 Stable Channel Update for Desktop
The Stable channel has been updated to 134.0.6998.88/.89 for Windows, Mac and 134.0.6998.88 for Linux which will roll out over the coming days/weeks.

This update includes 5 security fixes. Below, we highlight fixes that were contributed by external researchers.

[$7000][398065918] High CVE-2025-1920: Type Confusion in V8. Reported by Excello s.r.o. on 2025-02-21
[TBD][400052777] High CVE-2025-2135: Type Confusion in V8. Reported by Zhenghang Xiao (@Kipreyyy) on 2025-03-02
[NA][401059730] High CVE-TBD: Out of bounds write in GPU. Reported on 2025-03-05
[$3000][395032416] Medium CVE-2025-2136: Use after free in Inspector. Reported by Sakana.S on 2025-02-10
[$2000][398999390] Medium CVE-2025-2137: Out of bounds read in V8. Reported by zeroxiaobai@ on 2025-02-25
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top