Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.

  • [48225] [51727] Medium Possible autofill / autocomplete profile spamming. Credit to Google Chrome Security Team (Inferno).
  • [48857] High Crash with forms. Credit to the Chromium development community.
  • [50428] Critical Browser crash with form autofill. Credit to the Chromium development community.
  • [$500] [51680] High Possible URL spoofing on page unload. Credit to kuzzcc; plus independent discovery by Jordi Chancel.
  • [53002] Low Pop-up block bypass. Credit to kuzzcc.
  • [53985] Medium Crash on shutdown with Web Sockets. Credit to the Chromium development community.
  • [Linux only] [54132] Low Bad construction of PATH variable. Credit to Dan Rosenberg, Virtual Security Research.
  • [$500] [54500] High Possible memory corruption with animated GIF. Credit to Simon Schaak.
  • [Linux only] [54794] High Failure to sandbox worker processes on Linux. Credit to Google Chrome Security Team (Chris Evans).
  • [56451] High Stale elements in an element map. Credit to Michal Zalewski of the Google Security Team.
In addition, we would like to credit Aki Helin of OUSPG and kuzzcc for finding bugs during the development cycle such that they never reached a stable build.