*Acer C7 devices will not receive updates if their Hardware ID matches this pattern: "PARROT <NAME_OF_FISH> <LETTER>-E <NUMBERS>". To continue receiving updates, please switch to the beta channel. Updates to the stable channel will resume in the New Year. To find a device's Hardware ID, go to chrome://system, click on 'Expand' next to 'bios_info' and find the row entitled 'hwid'.

Ben Henry
Chrome OS


If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).


Matthew Yuan
Google Chrome

If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).

Dharani Govindan
Google Chrome
Share on Twitter Share on Facebook


If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).


Matthew Yuan
Google Chrome
Share on Twitter Share on Facebook

Share on Twitter Share on Facebook


*Acer C7 devices will not receive updates if their Hardware ID matches this pattern: "PARROT <NAME_OF_FISH> <LETTER>-E <NUMBERS>".  To continue receiving updates, please switch to the beta channel.  Updates to the stable channel will resume in the New Year.  To find a device's Hardware ID, go to chrome://system, click on 'Expand' next to 'bios_info' and find the row entitled 'hwid'.

Ben Henry
Google Chrome
Share on Twitter Share on Facebook

If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).

Dharani Govindan
Google Chrome
Share on Twitter Share on Facebook

Share on Twitter Share on Facebook


Known Issues:

If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).

Matthew Yuan
Google Chrome
Share on Twitter Share on Facebook


Security Fixes and Rewards


Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.


This update includes 15 security fixes. Below, we highlight fixes that were either contributed by external researchers or are particularly interesting. Please see the Chromium security page for more information.


[$1337][307159] Medium CVE-2013-6634: Session fixation in sync related to 302 redirects. Credit to Andrey Labunets.
[$2000][314469] High CVE-2013-6635: Use-after-free in editing. Credit to cloudfuzzer.
[$500][322959] Medium CVE-2013-6636: Address bar spoofing related to modal dialogs. Credit to Bas Venis.


We would also like to thank cloudfuzzer for working with us during the development cycle to prevent security bugs from ever reaching the stable channel. $2500 in additional rewards were issued.


As usual, our ongoing internal security work responsible for a wide range of fixes:

Many of the above bugs were detected using AddressSanitizer.


A full list of changes is available in the SVN log. Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Anthony Laforge
Google Chrome
Share on Twitter Share on Facebook

Share on Twitter Share on Facebook

Share on Twitter Share on Facebook


Share on Twitter Share on Facebook

Share on Twitter Share on Facebook

Share on Twitter Share on Facebook

Systems will be receiving updates over the next several days.


Some highlights of these changes are:




Known Issues:


If you find new issues, please let us know by visiting our forum or filing a bug. Interested in switching channels? Find out how. You can submit feedback using ‘Report an issue...’ in the Chrome menu (3 horizontal bars in the upper right corner of the browser).


Matthew Yuan
Google Chrome
Share on Twitter Share on Facebook


Congratulations to Pinkie Pie, for reclaiming his title with another impressive exploit!

* This reward was co-sponsored by the HP Zero Day Initiative as part of Mobile Pwn2Own 2013.

Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.

A full list of changes is available in the SVN log. Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Anthony Laforge
Google Chrome
Share on Twitter Share on Facebook

Share on Twitter Share on Facebook

Share on Twitter Share on Facebook

Share on Twitter Share on Facebook



Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.


This update includes 25 security fixes. Below, we highlight fixes that were either contributed by external researchers or particularly interesting. Please see the Chromium security page for more information.


[$500][268565] Medium CVE-2013-6621: Use after free related to speech input elements. Credit to Khalil Zhani.
[$2000][272786] High CVE-2013-6622: Use after free related to media elements. Credit to cloudfuzzer.
[$500][282925] High CVE-2013-6623: Out of bounds read in SVG. Credit to miaubiz.
[$1000][290566] High CVE-2013-6624: Use after free related to “id” attribute strings. Credit to Jon Butler.
[$2000][295010] High CVE-2013-6625: Use after free in DOM ranges. Credit to cloudfuzzer.
[295695] Low CVE-2013-6626: Address bar spoofing related to interstitial warnings. Credit to Chamal de Silva.
[$4000][299892] High CVE-2013-6627: Out of bounds read in HTTP parsing. Credit to skylined.
[$1000][306959] Medium CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. Credit to Antoine Delignat-Lavaud and Karthikeyan Bhargavan from Prosecco of INRIA Paris.


We would also like to thank miaubiz and Atte Kettunen of OUSPG for working with us during the development cycle to prevent security bugs from ever reaching the stable channel. $2000 in additional rewards were issued.


As usual, our ongoing internal security work responsible for a wide range of fixes:

Many of the above bugs were detected using AddressSanitizer.


A full list of changes is available in the SVN log. Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Anthony Laforge
Google Chrome
Share on Twitter Share on Facebook