Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
ClickFix Attack Targets macOS with Fake Disk Cleanup Lures
May 7, 2026
Massive 2.45B-Request DDoS Attack Used 1.2 Million IPs to Evade
May 7, 2026
Google Chrome 148 Released with Fix for 127 Security
May 7, 2026
Home/CyberSecurity News/Google Chrome 148 Released with Fix for 127 Security
CyberSecurity News

Google Chrome 148 Released with Fix for 127 Security

Google has officially promoted Chrome 148 to the stable channel for Windows, Mac, and Linux. This update rolls out as version 148.0.7778.96 for Linux and 148.0.7778.96/97 for Windows and Mac. It...

Sarah simpson
Sarah simpson
May 7, 2026 2 Min Read
2 0

Google has officially promoted Chrome 148 to the stable channel for Windows, Mac, and Linux. This update rolls out as version 148.0.7778.96 for Linux and 148.0.7778.96/97 for Windows and Mac. It stands as one of the browser’s most security-intensive releases in recent history, packing 127 security fixes into a single update.

Of the 127 vulnerabilities addressed, three carry a Critical severity rating, over two dozen are rated High, and a significant number fall under Medium and Low categories.

Google awarded more than $100,000 in bug bounties to external researchers for responsibly disclosing vulnerabilities, with a single researcher receiving $55,000 for reporting a High-severity out-of-bounds read and write flaw in V8.

Critical Chrome Vulnerabilities Patched

The three Critical-rated vulnerabilities pose the highest risk. CVE-2026-7896, an integer overflow in the Blink rendering engine, was reported on March 18 by an external researcher and earned a $43,000 bounty.

CVE-2026-7897 and CVE-2026-7898 are both use-after-free vulnerabilities, one in the Mobile component and one in Chromoting (Chrome Remote Desktop), both internally reported by Google on April 18 and April 20, respectively.

Use-after-free bugs are particularly dangerous as they can allow attackers to execute arbitrary code by manipulating freed memory regions.

The High-severity bracket covers a broad attack surface. CVE-2026-7899, an out-of-bounds read and write in Chrome’s V8 JavaScript engine, was reported by Project WhatForLunch (@pjwhatforlunch) and earned the update’s highest individual reward of $55,000.

CVE-2026-7900 and CVE-2026-7901 are heap buffer overflow and use-after-free bugs in ANGLE (the graphics abstraction layer), each earning $16,000 in rewards.

Additionally, CVE-2026-7902, an out-of-bounds memory access in V8, was reported by JunYoung Park of KAIST Hacking Lab and earned $8,000. Collectively, these V8 and ANGLE flaws represent significant risks for drive-by exploitation through maliciously crafted web pages.

Beyond the top-tier flaws, Chrome 148 addresses a cascade of use-after-free vulnerabilities across SVG, DOM, Fullscreen, GPU, WebRTC, Skia, Passwords, ServiceWorker, PresentationAPI, WebAudio, and more.

Medium-severity findings also include an object lifecycle issue in V8 (CVE-2026-7936), type confusion in WebRTC (CVE-2026-7988), and insufficient policy enforcement in DevTools, Extensions, and DirectSockets.

Notably, CVE-2026-8022, a Low-severity inappropriate implementation in MHTML, could allow a remote attacker to leak cross-origin data via a crafted MHTML page when a user is tricked into specific UI gestures.

Google credited dozens of independent researchers, including contributors from KAIST Hacking Lab, Tencent Security Xuanwu Lab, National Yang Ming Chiao Tung University’s Security and Systems Lab, and Theori.

According to Chrome’s advisory, the detected bugs were uncovered using automated fuzzing and sanitizer tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, libFuzzer, and AFL, underscoring the scale of Google’s proactive security testing infrastructure.

Users across Windows, Mac, and Linux should immediately update to Chrome 148.0.7778.96/97 to remediate these vulnerabilities.

The next stable release, Chrome 149, is scheduled for June 2, 2026. Users can update via Settings → Help → About Google Chrome, which triggers an automatic download and install.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurity

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Salat Malware Uses QUIC & WebSocket for Stealth Channels Stealthy

Next Post

Massive 2.45B-Request DDoS Attack Used 1.2 Million IPs to Evade

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
FEMITBOT Network Pushes Crypto Fraud via Telegram Uses Mini
May 7, 2026
Darkhub Hacking-for-Hire Portal: Crypto Advertises Fraud
May 7, 2026
CloudZ RAT Steals SMS OTPs via Microsoft Phone Abuses Link
May 6, 2026
Top Authors
Sarah simpson
Sarah simpson
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us