Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
AiTM Phishing Attacks Target SharePoint, HubSpot, Google
May 2, 2026
Attackers Abuse AppSheet, Netlify, Telegram for Google Facebook
May 2, 2026
Home/CyberSecurity News/Chrome Security Update Fixes 8 Remote Code Execution Flaws
CyberSecurity News

Chrome Security Update Fixes 8 Remote Code Execution Flaws

Google has issued an urgent security update for its Chrome browser. The patch addresses eight high-severity vulnerabilities. These newly patched security flaws could allow threat actors to execute...

Sarah simpson
Sarah simpson
March 24, 2026 2 Min Read
0 0

Google has issued an urgent security update for its Chrome browser. The patch addresses eight high-severity vulnerabilities.

These newly patched security flaws could allow threat actors to execute arbitrary code remotely, posing a significant risk to user data and system integrity.

The stable channel is currently receiving updates to version 146.0.7680.164 or 146.0.7680.165 for Windows and macOS users.

Meanwhile, Linux users will receive version 146.0.7680.164. Google expects these critical updates to reach all users over the coming days and weeks.

Chrome Security Update

The latest patches resolve several dangerous memory management and processing errors within Chrome’s underlying architecture.

Among the patched issues are “Use-After-Free” vulnerabilities in components such as Dawn, WebGPU, and FedCM.

These specific flaws occur when a program continues to use a memory pointer after the memory has been freed, allowing attackers to inject and execute malicious payloads.

Additionally, Google addressed heap buffer overflows in WebAudio and WebGL, out-of-bounds reading flaws in CSS, and an integer overflow in the Fonts component.

When chained together or successfully exploited, these memory corruption vulnerabilities give cybercriminals a path to bypass browser security sandboxes and compromise the host machine entirely.

Google’s development teams heavily rely on advanced testing tools such as AddressSanitizer, MemorySanitizer, and libFuzzer to identify complex security bugs before they reach the stable channel.

The update addresses the following eight high-severity vulnerabilities:

CVE Identifier Component Vulnerability Type
CVE-2026-4673 WebAudio Heap buffer overflow
CVE-2026-4674 CSS Out of bounds read
CVE-2026-4675 WebGL Heap buffer overflow
CVE-2026-4676 Dawn Use after free
CVE-2026-4677 WebAudio Out of bounds read
CVE-2026-4678 WebGPU Use after free
CVE-2026-4679 Fonts Integer overflow
CVE-2026-4680 FedCM Use after free

To protect the user base, Google intentionally restricts access to specific technical bug details and exploit links.

This industry standard practice ensures that most users can install the security update before threat actors can reverse-engineer the patch to launch widespread attacks.

The company also maintains restrictions if a vulnerability exists in a third-party library that other software projects depend on.

Google actively rewards security researchers for responsibly disclosing these threats, paying out a confirmed $7,000 bounty for the WebAudio vulnerability alone, with several other reward amounts still to be determined.

Cybersecurity professionals and everyday users must prioritize applying this update immediately.

To ensure your browser is fully protected against these potential remote code execution threats, navigate to the Chrome menu, select “Help,” and click on “About Google Chrome.”

This action forces the browser to check for the latest version and automatically download the security patch.

Administrators managing enterprise environments should push the update through their patch management systems to efficiently secure network endpoints.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVECybersecurityExploitPatchSecurityThreatVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Hackers Deploy Android Malware via Fake ChatGPT Invites

Next Post

NIST Guide: Cybersecurity, Risk, and Workforce Releases Quick-Start

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Attackers Abuse CAPTCHA, ClickFix for Cred Tactics Boost
May 1, 2026
DDoS Malware Exploits Jenkins to Attack Source Engine Games
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us