Posted March 7Mar 7 Google Chrome 135 Stable is now available for all supported platforms. The new version of Google's browser is a security and feature update.Users on unmanaged devices should receive the update automatically. Desktop users may speed up the installation by selecting Menu > Help > About Google Chrome, or by loading the address chrome://settings/help directly in the address bar.Chrome should pick up the update automatically when the page is opened. A restart is required to finish the update.Chrome 135: security changesGoogle says that it fixed 14 security issues in the desktop version of Chrome and the mobile Android version. Nine of the security issues were reported by external researchers, and only those are revealed publicly by Google. The aggregate severity rating is high, which means that there are not any critical issues that were reported openly to Google.Google does not mention exploits in the wild, which means that the company has not seen signs of malware actors exploiting one of the vulnerabilities already in attacks.Chrome 135 includes a new privacy feature: HTST Tracking Prevention.Websites and services may use HTTP Strict Transport Security (HSTS) to declare themselves accessible only through security connections. It is declared by sites via the Strict-Transport-Security HTTP response header field and may also be declared through other means.The anti-tracking feature in Chrome prevents third-parties from using the feature for tracking. This is done by disallowing HSTS upgrades for sub-resource requests in Chrome.Here is a simple example of how HSTS can be used for tracking:Any hostname may declare HSTS.Trackers can load content from several subresources on a webpage and create a unique identifier using declarations. Think long binary code that can unique identify a user.When a user visits a site that loads the subresources, the tracker can identify users by observing which connections are made via HTTP and which via HTTPS.Fun fact: we covered HSTS tracking in Firefox back in 2015 already.Other changes in Chrome 135The new browser version includes a number of other changes that users need to know about:Enhanced Protection users benefit from "on-device Large Language Models (LLMs) to identify scam websites". The LLM is collecting security-related signals from the webpage and sending them to Safe Browsing. This rolled out in Chrome 134, but Chrome 135 is now showing warnings to the user based on the verdict of its Safe Browsing server.Google says that the password form detection has improved thanks to "new client-side Machine Learning", which better parses forms on the web.Extensions may now be saved to a Google Account. This rolls out to some users only and is shown only when new extensions do get installed.Incognito Mode blocks third-party cookie Windows 11/10 تثبيت صامتSilent installation https://www.mediafire.com/file/pb08w69d36fkuba/Google+Chrome+135.0.7049.115+AIO+Silent+Install.7z/file https://seyarabata.com/68094197116c9 Windows 7/8 Silent installation Google Chrome 109.0.5414.168 AIO windows 7 last version Install Silent https://www.mediafire.com/file/y480s6kyzu9k81l/Google+Chrome+109.0.5414.168+AIO+Install+Silent.7z/file https://mir.cr/0GHBFW82 Edited 7 hours ago7 hr by T3rM1nat0Rr3
April 16Apr 16 Author The Stable channel has been updated to 135.0.7049.95/.96 for Windows, Mac and 135.0.7049.95 for Linux which will roll out over the coming days/weeks. A full list of changes in this build is available in the Log.Security Fixes and RewardsNote: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.This update includes 2 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.[TBD][409619251] Critical CVE-2025-3619: Heap buffer overflow in Codecs. Reported by Elias Hohl on 2025-04-09[TBD][405292639] High CVE-2025-3620: Use after free in USB. Reported by @retsew0x01 on 2025-03-21We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.Many of our security bugs are detected using AddressSanitizer, MemorySanitizer,UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL. Interested in switching release channels? Find out how here. If you find a new issue, please let us know by filing a bug. The community help forum is also a great place to reach out for help or learn about common issues.PrudhviKumar Bommana Google Chrome
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.