In order to fix 11 serious security vulnerabilities, Google has released Chrome 145.0.7632.45 for Windows, Mac, and Linux in the Stable Channel This article explores vulnerabilities google released. . This update, which was released on February 10, fixes flaws that might allow hackers to run malicious code on users' devices, possibly leading to malware installation or data theft.

To guarantee stability, the rollout is done gradually over a few days or weeks. These fixes focus on major problems like buffer overflows and use-after-free errors, which are frequent ways for hackers to cause browser crashes and execute arbitrary code. For example, the browser may be tricked into accessing deleted memory by a use-after-free in CSS (CVE-2026-2313), which could allow for remote attacks. Likewise, memory corruption from corrupted media files is a risk associated with a heap buffer overflow in Codecs (CVE-2026-2314).

Some vulnerabilities affect frames, animations, and file handling, while WebGPU flaws (CVE-2026-2315) expose graphics processing to exploits. Through its Vulnerability Reward Program, Google recognized community efforts by rewarding researchers with more than $21,500. According to Chrome's policy, severe bugs predominate and details are restricted until the majority of users update.

These pre-releases were found with the aid of programs like libFuzzer and AddressSanitizer. Users should use Chrome's "About" menu (chrome://settings/help) to update right away. By default, auto-updates are enabled; however, exposure is avoided through manual checks. Businesses can use managed policies to push.

Although there haven't been any reports of widespread exploits yet, zero-days like these encourage drive-by downloads and phishing attempts. CVE ID Severity Bounty Component Reporter(s) Date of Report CVE-2026-2313 High $8000 CSS (Use after free) Han Zheng et al.

HexHive CVE-2026-2314 2025-12-09 High N/A Codecs (overflow heap) CVE-2026-2315 Google 2026-01-26 WebGPU Google 2026-01-27 CVE-2026-High N/A2316 Medium $5,000 (Policy) Frames CVE-2026-2317 Luan Herrera 2025-06-05 Brendan Draper, Medium, $2000 Animation CVE-2026-2318 2025-11-28 $1000 medium Shaheen Fazim 2024-09-02 CVE-2026-2319 PictureInPicture $1000 medium DevTools (Race) Anonymous CVE-2026-2320 2023-09-01 Alesandro Ortiz 2025-08-02 CVE-2026-2321 Medium TBD File input Medium N/A Ozone (Use after free) CVE-2026-2322 Google 2025-11-18 Low: $1000 Robbe Van Roey 2025-12-22 CVE-2026-2323 is the file input. $500 or less Hafiizh 2025-12-10 downloads Chrome's quick reaction to threats is demonstrated by this patch. Complete information can be found on the Chromium Security page and the Chrome Releases blog.

To reduce the risk of code execution, be alert and update right away.