

Out of bounds read vulnerability exists in libjpeg-turbo.Incorrect security UI vulnerability exists in Web Browser UI.

Use after free vulnerability exists in File System API.Inappropriate implementation vulnerability exists in Google Updater.Inappropriate implementation vulnerability exists in Background Fetch API.Inappropriate implementation vulnerability exists in Compositing.Inappropriate implementation vulnerability exists in ChromeOS Networking.Side-channel information leakage vulnerability exists in DevTools.Use after free vulnerability exists in Performance Manager.Use after free vulnerability exists in Tab Strip.Inappropriate implementation vulnerability exists in Blink graphics.Use after free vulnerability exists in Task Manager.Inappropriate implementation vulnerability exists in Navigation.Use after free vulnerability exists in WebGPU.Use after free vulnerability exists in Offline use.Details of the vulnerabilities are as follows: Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.
