Chrome 143 Update Patches 13 Security Vulnerabilities Allowing Arbitrary Code Execution

Chrome 143 Update Patches 13 Security Vulnerabilities Allowing Arbitrary Code Execution

Google has released Chrome 143 to the stable channel, addressing 13 security vulnerabilities that could allow attackers to execute arbitrary code on affected systems.

The update is now rolling out to Windows, Mac, and Linux users worldwide.

The latest version, Chrome 143.0.7499.40 for Linux and Chrome 143.0.7499.40/41 for Windows and Mac, brings essential security fixes along with various improvements.

Users are strongly encouraged to update their browsers immediately to protect against potential attacks.

Critical Security Fixes

The update addresses four high-severity vulnerabilities, including a dangerous type confusion bug in Chrome’s V8 JavaScript engine.

CVE ID Severity Component Description
CVE-2025-13630 High V8 Type Confusion
CVE-2025-13631 High Google Updater Inappropriate Implementation
CVE-2025-13632 High DevTools Inappropriate Implementation
CVE-2025-13633 High Digital Credentials Use After Free
CVE-2025-13634 Medium Downloads Inappropriate Implementation
CVE-2025-13720 Medium Loader Bad Cast
CVE-2025-13721 Medium V8 Race Condition
CVE-2025-13635 Low Downloads Inappropriate Implementation
CVE-2025-13636 Low Split View Inappropriate Implementation
CVE-2025-13637 Low Downloads Inappropriate Implementation
CVE-2025-13638 Low Media Stream Use After Free
CVE-2025-13639 Low WebRTC Inappropriate Implementation
CVE-2025-13640 Low Passwords Inappropriate Implementation

This flaw could allow attackers to run malicious code on victims’ computers. Google paid $11,000 to the researcher who discovered this issue.

The most serious flaw is the type confusion bug in V8. Type confusion occurs when the browser mishandles data, creating opportunities for attackers to take control of a system.

Two “use after free” vulnerabilities were also patched. These occur when the browser tries to use memory that has already been released, potentially allowing code execution.

Several “inappropriate implementation” issues were fixed across different components, including DevTools, Downloads, and WebRTC.

Chrome typically updates automatically. To manually check for updates:

  1. Open Chrome
  2. Click the three-dot menu
  3. Go to Help > About Google Chrome
  4. Chrome will check for and install updates

Google thanked all security researchers who reported these issues. The company uses tools such as AddressSanitizer, MemorySanitizer, and libFuzzer to detect security bugs before they reach users.

Users who discover new security issues can report them through Google’s bug reporting system. The Chrome community forum is available for those needing help with browser issues.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link