• About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us
AimactGrow
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing
No Result
View All Result
AimactGrow
No Result
View All Result

Chrome Safety Replace Fixes 26 Vulnerabilities Enabling Distant Malicious Code Execution

Admin by Admin
March 21, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Google has launched a important safety replace for its Chrome desktop net browser, addressing 26 distinct vulnerabilities that would allow attackers to execute malicious code remotely.

The Steady channel replace introduces variations 146.0.7680.153 and 146.0.7680.154 for Home windows and macOS programs, whereas Linux environments will obtain model 146.0.7680.153.

This substantial patch cycle is actively rolling out over the approaching days and weeks, delivering important protections in opposition to extreme reminiscence corruption flaws.

To make sure full safety, customers are strongly suggested to restart their browsers instantly after the automated obtain completes so the brand new safety measures are absolutely utilized.

Crucial and Excessive-Severity Flaws Addressed

This complete safety replace patches three vulnerabilities rated as Crucial, alongside 22 Excessive-severity bugs and one Medium-severity concern.

The important flaws contain an out-of-bounds reminiscence entry and an out-of-bounds learn and write within the WebGL graphics element, in addition to a extreme use-after-free vulnerability within the Base element.

Lots of the high-severity flaws, equivalent to heap buffer overflows and integer overflows, have an effect on core browser processing engines together with WebRTC, V8, ANGLE, Blink, and WebAudio.

If left unpatched, these reminiscence corruption vulnerabilities may enable unauthenticated distant attackers to compromise system integrity just by tricking victims into visiting specifically crafted net pages.

As a part of its normal safety protocol, Google closely restricts public entry to detailed bug reviews and exploit chains till a overwhelming majority of the person base has efficiently utilized the patch.

This delayed disclosure technique efficiently prevents opportunistic risk actors from reverse-engineering the patches to develop zero-day exploits concentrating on slow-to-update programs.

The corporate additionally maintains these strict information restrictions if a bug exists in a third-party library that different exterior tasks depend upon however haven’t but mounted.

People and enterprise organizations should prioritize well timed safety updates to defend in opposition to these refined distant code execution threats.

Full Record of Patched Vulnerabilities

The next desk particulars the precise safety vulnerabilities addressed on this Chrome replace.

CVE ID Severity Description Date Reported
CVE-2026-4439  Crucial Out of bounds reminiscence entry in WebGL 2026-01-15
CVE-2026-4440  Crucial Out of bounds learn and write in WebGL 2026-02-20
CVE-2026-4441  Crucial Use after free in Base 2026-03-03
CVE-2026-4442  Excessive Heap buffer overflow in CSS 2026-02-16
CVE-2026-4443  Excessive Heap buffer overflow in WebAudio 2026-02-18
CVE-2026-4444  Excessive Stack buffer overflow in WebRTC 2026-02-21
CVE-2026-4445  Excessive Use after free in WebRTC 2026-02-22
CVE-2026-4446  Excessive Use after free in WebRTC 2026-02-22
CVE-2026-4447  Excessive Inappropriate implementation in V8 2026-02-23
CVE-2026-4448  Excessive Heap buffer overflow in ANGLE 2026-02-23
CVE-2026-4449  Excessive Use after free in Blink 2026-02-24
CVE-2026-4450  Excessive Out of bounds write in V8 2026-02-26
CVE-2026-4451  Excessive Inadequate validation of untrusted enter in Navigation 2026-02-26
CVE-2026-4452  Excessive Integer overflow in ANGLE 2026-02-26
CVE-2026-4453  Excessive Integer overflow in Daybreak 2026-02-27
CVE-2026-4454  Excessive Use after free in Community 2026-03-01
CVE-2026-4455  Excessive Heap buffer overflow in PDFium 2026-03-01
CVE-2026-4456  Excessive Use after free in Digital Credentials API 2026-02-28
CVE-2026-4457  Excessive Kind Confusion in V8 2026-03-01
CVE-2026-4458  Excessive Use after free in Extensions 2026-03-04
CVE-2026-4459  Excessive Out of bounds learn and write in WebAudio 2026-03-06
CVE-2026-4460  Excessive Out of bounds learn in Skia 2026-03-06
CVE-2026-4461  Excessive Inappropriate implementation in V8 2026-03-07
CVE-2026-4462  Excessive Out of bounds learn in Blink 2026-03-09
CVE-2026-4463  Excessive Heap buffer overflow in WebRTC 2026-03-10
CVE-2026-4464  Medium Integer overflow in ANGLE 2026-02-24

Many of those extreme safety bugs have been detected utilizing inner safety instruments equivalent to AddressSanitizer, MemorySanitizer, and Management Move Integrity.

Google prolonged its due to all unbiased safety researchers who labored through the improvement cycle to forestall these bugs from reaching the secure channel.

To make sure your browser is absolutely protected, navigate to the settings menu in Google Chrome, choose the assistance part, and click on on the “About Google Chrome” choice to set off the automated replace course of.

Observe us on Google Information, LinkedIn, and X to Get On the spot Updates and Set GBH as a Most well-liked Supply in Google.

Tags: ChromeCodeEnablingExecutionFixesMaliciousRemoteSecurityupdateVulnerabilities
Admin

Admin

Next Post
NVIDIA Releases Nemotron-Cascade 2: An Open 30B MoE with 3B Energetic Parameters, Delivering Higher Reasoning and Robust Agentic Capabilities

NVIDIA Releases Nemotron-Cascade 2: An Open 30B MoE with 3B Energetic Parameters, Delivering Higher Reasoning and Robust Agentic Capabilities

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

Sophos ranked #1 total for Firewall, MDR, and EDR within the G2 Spring 2025 Stories – Sophos Information

Sophos ranked #1 total for Firewall, MDR, and EDR within the G2 Spring 2025 Stories – Sophos Information

March 31, 2025
GEO, AEO, LLMO: Separating Reality from Fiction & The way to Win AI Search [MozCon 2025 Speaker Series]

GEO, AEO, LLMO: Separating Reality from Fiction & The way to Win AI Search [MozCon 2025 Speaker Series]

September 5, 2025

Trending.

The way to Clear up the Wall Puzzle in The place Winds Meet

The way to Clear up the Wall Puzzle in The place Winds Meet

November 16, 2025
Researchers Uncover Crucial GitHub CVE-2026-3854 RCE Flaw Exploitable by way of Single Git Push

Researchers Uncover Crucial GitHub CVE-2026-3854 RCE Flaw Exploitable by way of Single Git Push

April 29, 2026
Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

Google Introduces Simula: A Reasoning-First Framework for Producing Controllable, Scalable Artificial Datasets Throughout Specialised AI Domains

April 21, 2026
Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

Google DeepMind Introduces Decoupled DiLoCo: An Asynchronous Coaching Structure Reaching 88% Goodput Below Excessive {Hardware} Failure Charges

April 24, 2026
5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

5 AI Compute Architectures Each Engineer Ought to Know: CPUs, GPUs, TPUs, NPUs, and LPUs In contrast

April 10, 2026

AimactGrow

Welcome to AimactGrow, your ultimate source for all things technology! Our mission is to provide insightful, up-to-date content on the latest advancements in technology, coding, gaming, digital marketing, SEO, cybersecurity, and artificial intelligence (AI).

Categories

  • AI
  • Coding
  • Cybersecurity
  • Digital marketing
  • Gaming
  • SEO
  • Technology

Recent News

MindsEye Dev Reportedly Laid Off 170 Of 250 Workers

MindsEye Dev Reportedly Laid Off 170 Of 250 Workers

May 5, 2026
Credulous

The very best 12 months | Seth’s Weblog

May 5, 2026
  • About Us
  • Privacy Policy
  • Disclaimer
  • Contact Us

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved

No Result
View All Result
  • Home
  • Technology
  • AI
  • SEO
  • Coding
  • Gaming
  • Cybersecurity
  • Digital marketing

© 2025 https://blog.aimactgrow.com/ - All Rights Reserved