Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical GitLab Flaws Allow XSS and Unauthenticated Do
May 14, 2026
Hackers Exploit HWMonitor to Load Malicious Abuse Legitimate
May 14, 2026
Palo Alto PAN-OS 0-Day Exploited to Execute Arbitrary Code With
May 14, 2026
Home/CyberSecurity News/Chrome Flaws Allow Arbitrary Code Execution & System Cras
CyberSecurity News

Chrome Flaws Allow Arbitrary Code Execution & System Cras

Google has issued a critical security update for its Chrome Stable channel, patching two high-severity vulnerabilities. These flaws could expose users to arbitrary code execution (ACE) and...

Marcus Rodriguez
Marcus Rodriguez
February 4, 2026 2 Min Read
6 0

Google has issued a critical security update for its Chrome Stable channel, patching two high-severity vulnerabilities. These flaws could expose users to arbitrary code execution (ACE) and denial-of-service (DoS) attacks.

Table Of Content

  • CVE-2026-1862: Type Confusion in V8
  • CVE-2026-1861: Heap Buffer Overflow in libvpx
  • Mitigations

The update pushes the browser version to 144.0.7559.132/.133 for Windows and macOS, and 144.0.7559.132 for Linux.

The technology giant confirmed that the rollout will occur over the coming days and weeks. These patches specifically target memory corruption issues within the browser’s JavaScript engine and video processing libraries.

The update resolves two specific security flaws, both classified as “High” severity. Successful exploitation of these vulnerabilities typically requires a user to visit a specially crafted website, which can trigger the exploit within the browser’s renderer process.

CVE-2026-1862: Type Confusion in V8

The most significant flaw is located in V8, Google’s open-source high-performance JavaScript and WebAssembly engine. Type Confusion vulnerabilities occur when the engine is tricked into accessing a memory resource using an incompatible type for example, treating an integer as a pointer.

Attackers frequently leverage V8 type confusion bugs to manipulate memory pointers. This manipulation allows them to read or write memory out of bounds, potentially leading to arbitrary code execution within the sandboxed environment. This vulnerability was reported by researcher Chaoyuan Peng (@ret2happy).

CVE-2026-1861: Heap Buffer Overflow in libvpx

The second vulnerability resides in libvpx, the reference software library for the VP8 and VP9 video coding formats. A heap buffer overflow occurs when a process attempts to write more data to a fixed-length memory buffer than it can hold.

In this context, an attacker could embed a malformed video stream on a webpage. When Chrome attempts to process this video using libvpx, the overflow could corrupt adjacent memory on the heap. This usually results in a browser crash (DoS) but can also be chained with other exploits to achieve code execution.

CVE ID Severity Description Component Reported By
CVE-2026-1862 High Type Confusion V8 Engine Chaoyuan Peng
CVE-2026-1861 High Heap Buffer Overflow libvpx Google Internal

Mitigations

Google has not disclosed whether these exploits are currently being used in the wild (zero-day status), keeping bug details restricted until a majority of the user base has updated. However, given the nature of V8 and heap overflow vulnerabilities, the risk of weaponization remains high.

Enterprise administrators and users are advised to update immediately. To verify the installation:

  1. Open Chrome and navigate to Menu > Help > About Google Chrome.
  2. Ensure the browser checks for updates and restarts to apply version 144.0.7559.132 or later.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Hackers Exploit React Server Components Vulnerability

Next Post

Hackers Actively Scanning Citrix NetScaler Login Panels

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Packagist: Urgent Composer Update After GitHub Token Leak
May 14, 2026
Seedworm APT Abuses Fortemedia & SentinelOne Signed Binaries
May 14, 2026
Critical Windows DNS Client Flaw Allows Remote Code Execution
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us