Google Patches High-Risk Vulnerabilities in Chrome

Version 23.0.1271.91 patches vulnerabilities that affect a corrupt rendering in the Apple OS X driver for Intel GPUs, a buffer underflow in libxml, as well as a high-risk use-after-free in SVG filters bug.

Additional security fixes cover an out-of-bounds read in Skia, a use-after-free bug printing bug, a bad cast in input element handling, and a browser crash issue. Google paid a total of $2,500 in external bug rewards. In addition to the security problems, the new Chrome version also patches a problem that resulted in no audio from Flash content when the speaker configuration is set to quadraphonic, and a renderer crash on Windows Server 2003.

Google released the new browser version for Windows, Mac, Linux, and ChromeFrame platforms.


Contact Us for News Tips, Corrections and Feedback

Create a new thread in the US News comments forum about this subject
This thread is closed for comments
Comment from the forums
    Your comment
  • A Bad Day
    Certain software companies:

    "Shh, if we don't say anything and prevent others from doing the same, then we don't have to do anything..."
  • Pennanen
    I didnt know a botnet could have security vulnerabilities.
  • Pherule
    PennanenI didnt know a botnet could have security vulnerabilities.

    My thoughts exactly. Chrome users should consider switching to Comodo Dragon. It's Chrome without the botnet.