The dev channel has been updated to 114.0.5735.6 for Mac and Linux, windows coming soon.


A partial list of changes is available in the log. Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.

Srinivas Sista
Google Chrome

The Beta channel is being updated to OS version: 15393.38.0, Browser version: 113.0.5672.67 for most ChromeOS devices.If you find new issues, please let us know one of the following ways



1421268 High  CVE-2023-1532 Out of bounds read in GPU Video
1420510 High CVE-2023-1811 Use after free in Frames
1432603 High CVE-2023-2136 Integer overflow in Skia
1432210 High CVE-2023-2033 Out of bounds memory access in Service Worker API
High CVE-2023-0266 Security Vulnerability - Use-after-free in ChromeOS
High CVE-2022-2196 Linux kernel vulnerability advisory CVE-2022-2196
High CVE-2023-26083 CVE-2023-26083 discloses kernel pointers on Mali [March 31]
High CVE-2023-1281 Linux kernel vulnerability advisory CVE-2023-1281



Giuliana Pritchard 

Google Chrome OS


Srinivas Sista
Google Chrome

Interested in switching channels? Find out how.


Google ChromeOS

Srinivas Sista
Google Chrome

Google ChromeOS



1419718 High CVE-2023-1529 Out of bounds memory access in WebHID
1421773 High CVE-2023-1528 Use after free in Passwords
1422183 High CVE-2023-1533 Use after free in WebProtect
1422594 High CVE-2023-1534 Out of bounds read in ANGLE
1419831 HIgh CVE-2023-1530 Use after free in PDF

Giuliana Pritchard 

Google Chrome OS


Srinivas Sista
Google Chrome

Srinivas Sista
Google Chrome

Srinivas Sista
Google Chrome

Interested in switching channels? Find out how.


Google ChromeOS


Srinivas Sista
Google Chrome

Google ChromeOS 


A full list of changes in this build is available in the log. Interested in switching release channels? Find out how here. If you find a new issues, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.


Prudhvikumar Bommana Google Chrome

[$TBD][1335974] High CVE-2023-2313: Inappropriate implementation in Sandbox. Reported by Anonymous on 2022-06-14

[$5000][1418224] Medium CVE-2023-1812: Out of bounds memory access in DOM Bindings. Reported by Shijiang Yu on 2023-02-22

[$5000][1423258] Medium CVE-2023-1813: Inappropriate implementation in Extensions. Reported by Axel Chong on 2023-03-10

[$3000][1417325] Medium CVE-2023-1814: Insufficient validation of untrusted input in Safe Browsing. Reported by Young Min Kim (@ylemkimon), CompSec Lab at Seoul National University on 2023-02-18

[$2000][1278708] Medium CVE-2023-1815: Use after free in Networking APIs. Reported by DDV_UA on 2021-12-10

[$1000][1413919] Medium CVE-2023-1816: Incorrect security UI in Picture In Picture. Reported by NDevTK on 2023-02-08

[$1000][1418061] Medium CVE-2023-1817: Insufficient policy enforcement in Intents. Reported by Axel Chong on 2023-02-22

[$1000][1354505] Medium CVE-2023-2311: Insufficient policy enforcement in File System API. Reported by Axel Chong on 2022-08-19

[$NA][1223346] Medium CVE-2023-1818: Use after free in Vulkan. Reported by Abdulrahman Alqabandi, Microsoft Browser Vulnerability Research, Eric Lawrence, Microsoft, Patrick Walker (@HomeSen), and Kirtikumar Anandrao Ramchandani on 2021-06-24

[$NA][1406588] Medium CVE-2023-1819: Out of bounds read in Accessibility. Reported by Microsoft Edge Team on 2023-01-12

[$TBD][1408120] Medium CVE-2023-1820: Heap buffer overflow in Browser History. Reported by raven at KunLun lab on 2023-01-17

[$1000][1413618] Low CVE-2023-1821: Inappropriate implementation in WebShare. Reported by Axel Chong on 2023-02-07

[$500][1066555] Low CVE-2023-1822: Incorrect security UI in Navigation. Reported by 강우진 on 2020-04-01

[$TBD][1406900] Low CVE-2023-1823: Inappropriate implementation in FedCM. Reported by Jasper Rebane (popstonia) on 2023-01-13




We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:

[1430254] Various fixes from internal audits, fuzzing and other initiatives




Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.




Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.



Srinivas Sista
Google Chrome