Google has put out a new stable update for Chrome that fixes 26 security holes, including three serious bugs that could let remote code execution (RCE) happen when a victim simply visits a malicious web page or processes web content that has been made to look like it This article explores stable update chrome. . The update is being sent out to Windows and macOS as version 146.0.7680.153/154 and to Linux as version 146.0.7680.153.

A look at the patch The March 18, 2026, Stable Channel update fixes 26 security issues in important parts of the browser, such as WebGL, V8, WebRTC, Blink, ANGLE, CSS, Skia, PDFium, the Network stack, and the Digital Credentials API. Google says that technical details will stay secret until most users get the patch. This lowers the risk of quick exploit weaponization.

The release is mostly about memory safety problems, like multiple out-of-bounds accesses, heap and stack buffer overflows, integer overflows, use-after-free conditions, and type confusion bug classes that are often used to escape sandboxes and run arbitrary code in modern browsers. There are still "TBD" details for some bugs, and full exploitability information isn't public yet. However, the fact that there are so many memory corruption issues in components that can be accessed remotely suggests that they could be used to exploit real-world systems once patches are reversed and studied.

The update is now being sent out through the Stable Channel. Users of Windows, macOS, and Linux are strongly encouraged to upgrade to Chrome 146.0.7680.153/154 as soon as possible to lower the risk of remote code execution and other security breaches.

Businesses should put testing and deployment at the top of their list for managed fleets, especially when they use WebGL, WebRTC, PDF rendering, and complex web apps a lot. Make ZeroOwl your favorite source in Google.