Google Problems Chrome Security Update Emergency Several vulnerabilities, including high-severity issues affecting the browser's core engines, will be fixed by a major security update for the Chrome Stable Channel This article explores security update chrome. . Versions 145.0.7632.109/110 for Mac and Windows and 144.0.7559.109 for Linux have been made available, according to the tech giant.
The global user base is presently receiving this update. Three particular security updates that reduce the possibility of exploitation are included. To stop attackers from using these vulnerabilities to execute code arbitrarily or cause browser instability, security teams and individual users are strongly encouraged to apply these patches right away. Details and Analysis of Vulnerabilities This update's most important features center on PDFium and V8 memory-handling issues.
CVE ID Severity Description CVE-2026-2648 High Heap buffer overflow in PDFium CVE-2026-2649 High Integer overflow in the V8 JavaScript engine CVE-2026-2650 Overflow of the medium heap buffer in the media component A heap buffer overflow in PDFium, the browser's default PDF rendering engine, is the first high-severity issue (tracked as CVE-2026-2648). This vulnerability was discovered by security researcher Soiax. Usually, heap buffer overflows cause the target system to crash or give a threat actor the ability to run arbitrary code.
An integer overflow vulnerability in the V8 JavaScript engine is the second high-severity flaw, CVE-2026-2649. JunYoung Park (@candymate) of the KAIST Hacking Lab found this problem. It is frequently possible to get around security checks or corrupt memory by taking advantage of rendering engine integer overflows.
The update fixes a medium-severity vulnerability that Google discovered internally in addition to the high-severity flaws. This problem, which has been tracked as CVE-2026-2650, is a heap buffer overflow in the Media component. Access to specific bug details and exploit demonstrations is currently limited in compliance with Google's security disclosure policy.
By taking this precaution, threat actors are prevented from reversing the patch before the majority of users have successfully updated their browsers. By going to the Chrome menu, choosing Help, and then clicking on About Google Chrome, users can manually start the update process. The browser will download the latest version after automatically checking for updates. Users must restart the browser in order to finish the installation and guarantee that the security patches are active.
X, LinkedIn, and LinkedIn for daily ZeroOwl. To have your stories featured, get in touch with us.












.webp%3Fw%3D1068%26resize%3D1068%2C0%26ssl%3D1&w=3840&q=75)