Chrome Security Update Fixes 8 Remote Code Execution Flaws
Google has issued an urgent security update for its Chrome browser. The patch addresses eight high-severity vulnerabilities. These newly patched security flaws could allow threat actors to execute...
Google has issued an urgent security update for its Chrome browser. The patch addresses eight high-severity vulnerabilities.
These newly patched security flaws could allow threat actors to execute arbitrary code remotely, posing a significant risk to user data and system integrity.
The stable channel is currently receiving updates to version 146.0.7680.164 or 146.0.7680.165 for Windows and macOS users.
Meanwhile, Linux users will receive version 146.0.7680.164. Google expects these critical updates to reach all users over the coming days and weeks.
Chrome Security Update
The latest patches resolve several dangerous memory management and processing errors within Chrome’s underlying architecture.
Among the patched issues are “Use-After-Free” vulnerabilities in components such as Dawn, WebGPU, and FedCM.
These specific flaws occur when a program continues to use a memory pointer after the memory has been freed, allowing attackers to inject and execute malicious payloads.
Additionally, Google addressed heap buffer overflows in WebAudio and WebGL, out-of-bounds reading flaws in CSS, and an integer overflow in the Fonts component.
When chained together or successfully exploited, these memory corruption vulnerabilities give cybercriminals a path to bypass browser security sandboxes and compromise the host machine entirely.
Google’s development teams heavily rely on advanced testing tools such as AddressSanitizer, MemorySanitizer, and libFuzzer to identify complex security bugs before they reach the stable channel.
The update addresses the following eight high-severity vulnerabilities:
| CVE Identifier | Component | Vulnerability Type |
|---|---|---|
| CVE-2026-4673 | WebAudio | Heap buffer overflow |
| CVE-2026-4674 | CSS | Out of bounds read |
| CVE-2026-4675 | WebGL | Heap buffer overflow |
| CVE-2026-4676 | Dawn | Use after free |
| CVE-2026-4677 | WebAudio | Out of bounds read |
| CVE-2026-4678 | WebGPU | Use after free |
| CVE-2026-4679 | Fonts | Integer overflow |
| CVE-2026-4680 | FedCM | Use after free |
To protect the user base, Google intentionally restricts access to specific technical bug details and exploit links.
This industry standard practice ensures that most users can install the security update before threat actors can reverse-engineer the patch to launch widespread attacks.
The company also maintains restrictions if a vulnerability exists in a third-party library that other software projects depend on.
Google actively rewards security researchers for responsibly disclosing these threats, paying out a confirmed $7,000 bounty for the WebAudio vulnerability alone, with several other reward amounts still to be determined.
Cybersecurity professionals and everyday users must prioritize applying this update immediately.
To ensure your browser is fully protected against these potential remote code execution threats, navigate to the Chrome menu, select “Help,” and click on “About Google Chrome.”
This action forces the browser to check for the latest version and automatically download the security patch.
Administrators managing enterprise environments should push the update through their patch management systems to efficiently secure network endpoints.
Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.



No Comment! Be the first one.