• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Chrome Safety Replace Fixes 26 Vulnerabilities Enabling Distant Malicious Code Execution

Admin by Admin
March 21, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Google has launched a important safety replace for its Chrome desktop net browser, addressing 26 distinct vulnerabilities that would allow attackers to execute malicious code remotely.

The Steady channel replace introduces variations 146.0.7680.153 and 146.0.7680.154 for Home windows and macOS programs, whereas Linux environments will obtain model 146.0.7680.153.

This substantial patch cycle is actively rolling out over the approaching days and weeks, delivering important protections in opposition to extreme reminiscence corruption flaws.

To make sure full safety, customers are strongly suggested to restart their browsers instantly after the automated obtain completes so the brand new safety measures are absolutely utilized.

Crucial and Excessive-Severity Flaws Addressed

This complete safety replace patches three vulnerabilities rated as Crucial, alongside 22 Excessive-severity bugs and one Medium-severity concern.

The important flaws contain an out-of-bounds reminiscence entry and an out-of-bounds learn and write within the WebGL graphics element, in addition to a extreme use-after-free vulnerability within the Base element.

Lots of the high-severity flaws, equivalent to heap buffer overflows and integer overflows, have an effect on core browser processing engines together with WebRTC, V8, ANGLE, Blink, and WebAudio.

If left unpatched, these reminiscence corruption vulnerabilities may enable unauthenticated distant attackers to compromise system integrity just by tricking victims into visiting specifically crafted net pages.

As a part of its normal safety protocol, Google closely restricts public entry to detailed bug reviews and exploit chains till a overwhelming majority of the person base has efficiently utilized the patch.

This delayed disclosure technique efficiently prevents opportunistic risk actors from reverse-engineering the patches to develop zero-day exploits concentrating on slow-to-update programs.

The corporate additionally maintains these strict information restrictions if a bug exists in a third-party library that different exterior tasks depend upon however haven’t but mounted.

People and enterprise organizations should prioritize well timed safety updates to defend in opposition to these refined distant code execution threats.

Full Record of Patched Vulnerabilities

The next desk particulars the precise safety vulnerabilities addressed on this Chrome replace.

CVE ID Severity Description Date Reported
CVE-2026-4439  Crucial Out of bounds reminiscence entry in WebGL 2026-01-15
CVE-2026-4440  Crucial Out of bounds learn and write in WebGL 2026-02-20
CVE-2026-4441  Crucial Use after free in Base 2026-03-03
CVE-2026-4442  Excessive Heap buffer overflow in CSS 2026-02-16
CVE-2026-4443  Excessive Heap buffer overflow in WebAudio 2026-02-18
CVE-2026-4444  Excessive Stack buffer overflow in WebRTC 2026-02-21
CVE-2026-4445  Excessive Use after free in WebRTC 2026-02-22
CVE-2026-4446  Excessive Use after free in WebRTC 2026-02-22
CVE-2026-4447  Excessive Inappropriate implementation in V8 2026-02-23
CVE-2026-4448  Excessive Heap buffer overflow in ANGLE 2026-02-23
CVE-2026-4449  Excessive Use after free in Blink 2026-02-24
CVE-2026-4450  Excessive Out of bounds write in V8 2026-02-26
CVE-2026-4451  Excessive Inadequate validation of untrusted enter in Navigation 2026-02-26
CVE-2026-4452  Excessive Integer overflow in ANGLE 2026-02-26
CVE-2026-4453  Excessive Integer overflow in Daybreak 2026-02-27
CVE-2026-4454  Excessive Use after free in Community 2026-03-01
CVE-2026-4455  Excessive Heap buffer overflow in PDFium 2026-03-01
CVE-2026-4456  Excessive Use after free in Digital Credentials API 2026-02-28
CVE-2026-4457  Excessive Kind Confusion in V8 2026-03-01
CVE-2026-4458  Excessive Use after free in Extensions 2026-03-04
CVE-2026-4459  Excessive Out of bounds learn and write in WebAudio 2026-03-06
CVE-2026-4460  Excessive Out of bounds learn in Skia 2026-03-06
CVE-2026-4461  Excessive Inappropriate implementation in V8 2026-03-07
CVE-2026-4462  Excessive Out of bounds learn in Blink 2026-03-09
CVE-2026-4463  Excessive Heap buffer overflow in WebRTC 2026-03-10
CVE-2026-4464  Medium Integer overflow in ANGLE 2026-02-24

Many of those extreme safety bugs have been detected utilizing inner safety instruments equivalent to AddressSanitizer, MemorySanitizer, and Management Move Integrity.

Google prolonged its due to all unbiased safety researchers who labored through the improvement cycle to forestall these bugs from reaching the secure channel.

To make sure your browser is absolutely protected, navigate to the settings menu in Google Chrome, choose the assistance part, and click on on the “About Google Chrome” choice to set off the automated replace course of.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most well-liked Supply in Google.

Tags: ChromeCodeEnablingExecutionFixesMaliciousRemoteSecurityupdateVulnerabilities
Admin

Admin

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Methods from Somebody Who Lives It

Methods from Somebody Who Lives It

May 27, 2025
Pastime mindset | Seth’s Weblog

An invite to vibration | Seth’s Weblog

August 18, 2025

Trending.

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

AI-Assisted Menace Actor Compromises 600+ FortiGate Gadgets in 55 Nations

February 23, 2026
Exporting a Material Simulation from Blender to an Interactive Three.js Scene

Exporting a Material Simulation from Blender to an Interactive Three.js Scene

August 20, 2025
10 tricks to begin getting ready! • Yoast

10 tricks to begin getting ready! • Yoast

July 21, 2025
Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

Moonshot AI Releases 𝑨𝒕𝒕𝒆𝒏𝒕𝒊𝒐𝒏 𝑹𝒆𝒔𝒊𝒅𝒖𝒂𝒍𝒔 to Exchange Mounted Residual Mixing with Depth-Sensible Consideration for Higher Scaling in Transformers

March 16, 2026
Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

Introducing Sophos Endpoint for Legacy Platforms – Sophos Information

August 28, 2025

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

Chrome Safety Replace Fixes 26 Vulnerabilities Enabling Distant Malicious Code Execution

Chrome Safety Replace Fixes 26 Vulnerabilities Enabling Distant Malicious Code Execution

March 21, 2026
Information Showcase Label Examined in Google Uncover

Information Showcase Label Examined in Google Uncover

March 21, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved