Extended Stable Updates for Desktop
The Extended Stable channel has been updated to 146.0.7680.216Β for Windows and Mac which will roll out over the coming days/weeks.
The Extended Stable channel has been updated to 146.0.7680.216Β for Windows and Mac which will roll out over the coming days/weeks.
The Stable channel has been updated to 147.0.7727.137/138 for Windows/MacΒ andΒ 147.0.7727.137 for Linux, which will roll out over the coming days/weeks. A full list of changes in this build is available in theΒ Log
Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but havenβt yet fixed.
This update includes 30 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chrome Security Page for more information.
[$7000][494352590] Critical CVE-2026-7363: Use after free in Canvas. Reported by heapracer on 2026-03-19
[N/A][493221953] Critical CVE-2026-7361: Use after free in iOS. Reported by Google on 2026-03-16
[N/A][503419515] Critical CVE-2026-7344: Use after free in Accessibility. Reported by Google on 2026-04-16
[N/A][503645680] Critical CVE-2026-7343: Use after free in Views. Reported by Google on 2026-04-17
[$16000][493955227] High CVE-2026-7333: Use after free in GPU. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-19
[N/A][495852034] High CVE-2026-7360: Insufficient validation of untrusted input in Compositing. Reported by Google on 2026-03-24
[N/A][496284494] High CVE-2026-7359: Use after free in ANGLE. Reported by Google on 2026-03-25
[N/A][496285281] High CVE-2026-7358: Use after free in Animation. Reported by Google on 2026-03-25
[TBD][496456528] High CVE-2026-7334: Use after free in Views. Reported by Batuhan EΕref KOΓ on 2026-03-26
[N/A][497047552] High CVE-2026-7357: Use after free in GPU. Reported by Google on 2026-03-27
[N/A][497769116] High CVE-2026-7356: Use after free in Navigation. Reported by Google on 2026-03-30
[N/A][498746519] High CVE-2026-7354: Out of bounds read and write in Angle. Reported by Google on 2026-04-01
[N/A][498809718] High CVE-2026-7353: Heap buffer overflow in Skia. Reported by Google on 2026-04-01
[N/A][499023054] High CVE-2026-7352: Use after free in Media. Reported by Google on 2026-04-02
[N/A][499119490] High CVE-2026-7351: Race in MHTML. Reported by Google on 2026-04-02
[N/A][500018484] High CVE-2026-7350: Use after free in WebMIDI. Reported by Google on 2026-04-06
[N/A][500034684] High CVE-2026-7349: Use after free in Cast. Reported by Google on 2026-04-06
[N/A][500104917] High CVE-2026-7348: Use after free in Codecs. Reported by Google on 2026-04-06
[TBD][500387779] High CVE-2026-7335: Use after free in media. Reported by Jungwoo Lee (@physicube) and Wongi Lee (@_qwerty_po) on 2026-04-07
[TBD][500767595] High CVE-2026-7336: Use after free in WebRTC. Reported by Mozilla on 2026-04-09
[TBD][500880819] High CVE-2026-7337: Type Confusion in V8. Reported by q@calif.io on 2026-04-09
[N/A][501722605] High CVE-2026-7347: Use after free in Chromoting. Reported by Google on 2026-04-11
[N/A][502206907] High CVE-2026-7346: Inappropriate implementation in Tint. Reported by Google on 2026-04-13
[N/A][502248774] High CVE-2026-7345: Insufficient validation of untrusted input in Feedback. Reported by Google on 2026-04-13
[TBD][502449857] High CVE-2026-7338: Use after free in Cast. Reported by Krace on 2026-04-14
[N/A][503889643] High CVE-2026-7342: Use after free in WebView. Reported by Google on 2026-04-17
[N/A][504586599] High CVE-2026-7341: Use after free in WebRTC. Reported by Google on 2026-04-20
[$4000][493957495] Medium CVE-2026-7339: Heap buffer overflow in WebRTC. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-19
[$3000][497896137] Medium CVE-2026-7340: Integer overflow in ANGLE. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-30
[N/A][498285711] Medium CVE-2026-7355: Use after free in Media. Reported by Google on 2026-03-31
We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel.
Many of our security bugs are detected using AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, or AFL.
Interested in switching release channels? Find out howΒ here. If you find a new issue, please let us know byΒ filing a bug. TheΒ community help forumΒ is also a great place to reach out for help or learn about common issues.
Srinivas Sista
New: Help shape Bulwark Webmail. Each instance now sends a lightweight daily heartbeat (version, platform, bucketed account counts, feature toggles - never message data or PII) so we can see which platforms and features actually get used and prioritize fixes where they matter most. You're in control: opt out any time from Admin β Telemetry or by setting
BULWARK_TELEMETRY=off. Full schema in the privacy notice.
BULWARK_TELEMETRY=off, or by clearing the endpoint
Lately, thereβs been quite a bit of chatter echoing across the highways ofΒ American Truck Simulator. From truck stops to weigh stations, drivers have been exchanging stories about a certain unfamiliar rig cruising the open road. Naturally, this caught our attention!
This mysterious machine hasnβt made things easy for those trying to get a closer look. With its smooth ride and surprisingly quiet presence, it seems to come and go before anyone can properly study it. The image weβve seen so far leaves plenty of questions unanswered, but also sparks a lot of excitement.
What weβre seeing here is a truck that keeps its secrets well. Its modern design and refined presence hint at something built with both performance and driver comfort in mind. However, details remain limited, and no one has managed to get a closer, clearer lookβ¦ yet.
Reports suggest that this mysterious newcomer could be a strong contender for both long-haul journeys and regional routes alike, offering versatility for all kinds of jobs across the vast American landscape. Beyond that, though, weβll leave the speculation up to you.
Do you think you know what it might be?
Weβll be sharing more information when the time is right. Be sure to stay connected with us on our social media channels onΒ X/Twitter,Β Facebook,Β BlueSky,Β YouTube, andΒ Instagram, and byΒ subscribing to our newsletterΒ so you donβt miss any future updates! Until next time, happy haulin'!
Fixed an issue where Facebook and other websites might not load properly for users with Bitdefender security software installed. (Bug 2034178)
Fixed an issue where denying a geolocation permission prompt could cause Firefox to show the system permission dialog again on a second attempt. (Bug 2034120)
Fixed an issue that prevented tabs from being added to some older saved tab groups. (Bug 2031961)
Fixed a layout issue where some drop-down menus expanded to display all list items at once. (Bug 2033117)
Fixed an issue where borders and outlines on some page elements disappeared when pinch zooming or smart zooming on macOS and Windows. (Bug 2030043)
Various security fixes.
All Relay users can now create up to 50 email masksβan increase from the previous limit of 5.
Reference link to 150.0 release notes.

If you are upgrading from v0.16.x, replace the binary (or run docker pull). If you are upgrading from v0.15.x and below, please read the upgrading documentation for more information on how to upgrade from previous versions.
userinfo endpoint when JWT token does not contain an email claim.verifyAfterWrite option to verify that objects have persisted after writing.credentialId when there are password changes.
1.18.1
1.18.1
1.18.1
Full Changelog: v1.17.4...v1.18.0
1.18.0
1.18.0
1.18.0
Full Changelog: v1.17.3...v1.17.4
1.17.4
composer-sidebar slot and ui:composer-sidebar permission β plugins can now render a panel on either side of the New Message dialog. See repos/subway-surfers for an exampleframeOrigins β a strictly-validated list of https://host origins the plugin needs to embed. The proxy reads the union from enabled plugins and merges it into the host CSP frame-src, so the host CSP no longer needs to know about specific embed providers