Google has put out a very important security update for its Chrome browser This article explores security update chrome. . It fixes a zero-day flaw that is being actively used in the wild.

In the next few days and weeks, all users will get the update. CVE-2026-5281 is a use-after-free flaw in Chrome's cross-platform GPU abstraction layer that is used for WebGPU. Google has a standard way of limiting the spread of exploits that keeps vulnerability details and technical specifics secret until most users have received the patch. For Windows and Mac, the Stable channel is now at version 146.0.7680.177/178.

For Linux, it is at version 146.0.76 80.177. CVE-2026-5281 has been confirmed to be used in the wild, which puts all users of older versions of Google Chrome at risk.

If your company uses policy to manage Chrome deployments, send the update through their endpoint management platforms right away. To keep your system safe, do the following: 1. Go to Menu (⋮) → Help → About Google Chrome.

  1. The browser will automatically look for and install the most recent update. 3. Ask for a restart after the process is done, and 4.

Check all versions of Chrome before 146.1.1/177 for Windows or Mac operating systems for security holes, as these versions may be at risk. The high number of use-after-free bugs in Dawn, WebGL, WebCodecs, Web MIDI, WebView, Navigation, and Compositing shows that memory safety is still a problem in browser rendering pipelines. Google's internal security teams reported three high-severity patches, which shows that they are looking for threats before they happen.