Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities


Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws that could enable remote code execution or crashes.

The update, version 134.0.6998.35 for Linux, 134.0.6998.35/36 for Windows, and 134.0.6998.44/45 for macOS, follows weeks of testing and includes critical fixes for vulnerabilities in components like V8, PDFium, and Media Stream.

External researchers contributed nine of the patches, earning up to $7,000 in bug bounties, while Google’s internal teams resolved five additional issues through audits and automated tools.

Security Enhancements and External Collaborations

The most severe vulnerability, CVE-2025-1914, earned researchers Zhenghang Xiao and Nan Wang a $7,000 bounty for identifying an out-of-bounds read in Chrome’s V8 JavaScript engine.

This class of vulnerability often allows attackers to bypass security protocols or leak sensitive memory data.

Another critical fix, CVE-2025-1915, patched a path traversal flaw in DevTools that could expose local files, reported by Topi Lassila for a $4,000 reward.

Medium-severity issues dominated the update, including a use-after-free flaw in Profiles (CVE-2025-1916) reported by South Korea’s SSD Labs and an out-of-bounds read in PDFium (CVE-2025-1918) discovered by researcher “asnine.”

Notably, Khalil Zhani received two rewards totaling $3,000 for reporting implementation flaws in Browser UI and Permission Prompts (CVE-2025-1917 and CVE-2025-1923).

CVE ID Severity Vulnerability Description
CVE-2025-1914 High Out-of-bounds read in V8
CVE-2025-1915 Medium Path traversal in DevTools
CVE-2025-1916 Medium Use-after-free in Profiles
CVE-2025-1917 Medium Browser UI implementation flaw
CVE-2025-1918 Medium Out-of-bounds read in PDFium
CVE-2025-1919 Medium Out-of-bounds read in Media
CVE-2025-1921 Medium Media Stream implementation flaw
CVE-2025-1922 Low Selection implementation flaw
CVE-2025-1923 Low Permission Prompts implementation flaw

Internal Safeguards and Ongoing Efforts

Google’s internal security teams addressed five additional vulnerabilities through tools like AddressSanitizer and Control Flow Integrity.

These efforts focused on hardening components such as networking stacks and DOM handling, though specific CVE identifiers remain undisclosed to prevent exploitation.

The company emphasized its commitment to “zero-day prevention” through continuous fuzzing and sandboxing improvements.

The update will deploy incrementally over the coming weeks. Users can manually trigger an update via Chrome > Help > About Google Chrome.

Enterprises on the Extended Stable Channel will receive versions 134.0.6998.36 (Windows) and 134.0.6998.45 (macOS).

Google temporarily restricted access to detailed bug reports until most users install the patches. Researchers are urged to report new issues via Chrome’s bug tracker, with bounties available through the Vulnerability Reward Program.

As exploit chains targeting browsers grow more sophisticated, timely updates are critical. Chrome 134 underscores the balance between open-source collaboration and behind-the-scenes hardening—a model increasingly adopted across the industry.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free



Source link