Software Update: Google Chrome 49.0.2623.75

Spread the love

Google has released the stable version of version 49 of its web browser Chrome. Google Chrome is available for Windows, Linux, and OS X. There are also versions for Android and iOS, but they follow a slightly different release schedule. Bringing version 49 to the stable channel has fixed 26 security vulnerabilities, for which Google has rewarded some discoverers.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 26 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

  • [$8000][560011] high CVE-2016-1630: Same-origin bypass in Blink. Credit to Mariusz Mlynski.
  • [$7500][569496] high CVE-2016-1631: Same Origin Bypass in Pepper Plugin. Credit to Mariusz Mlynski.
  • [$5000][549986] high CVE-2016-1632: Bad cast in Extensions. Credit to anonymous.
  • [$3000][572537] high CVE-2016-1633: Use after free in Blink. Credit to cloud fuzzer.
  • [$3000][559292] high CVE-2016-1634: Use after free in Blink. Credit to cloud fuzzer.
  • [$2000][585268] high CVE-2016-1635: Use after free in Blink. Credit to Rob Wu.
  • [$2000][584155] high CVE-2016-1636: SRI Validation Bypass. Credit to Ryan Lester and Bryant Zadegan.
  • [$500][560291] high CVE-2015-8126: Out-of-bounds access in libpng. Credit to joerg.bornemann.
  • [$2000][555544] Medium CVE-2016-1637: Information Leak in Skia. Credit to Keve Nagy.
  • [$1000][585282] Medium CVE-2016-1638: WebAPI Bypass. Credit to Rob Wu.
  • [$1000][572224] Medium CVE-2016-1639: Use after free in WebRTC. Credit to Khalil Zhani.
  • [$1000][550047] Medium CVE-2016-1640: Origin confusion in Extensions UI. Credit to Luan Herrera.
  • [$500][583718] Medium CVE-2016-1641: Use after free in Favicon. Credit to Atte Kettunen or OUSPG.

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. An additional $14,500 in rewards were issued for security bugs present on non-stable channels.

As usual, our ongoing internal security work was responsible for a wide range of fixes:

  • [591402] CVE-2016-1642: Various fixes from internal audits, fuzzing and other initiatives.
  • Multiple vulnerabilities in V8 fixed at the tip of the 4.9 branch (currently 4.9.385.26).

Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, Control Flow Integrity or LibFuzzer.

Version number 49.0.2623.75
Release status stable
Operating systems Windows 7, Linux, Windows XP, macOS, Windows Server 2003, Windows Vista, Windows Server 2008, Windows Server 2012, Windows 8, Windows 10
Website Manufacturer
Download
License type Freeware
You might also like