Google has officially released Chrome 132 to the stable channel, bringing critical security updates and feature enhancements to users on Windows, macOS, and Linux.
The update, version 132.0.6834.83/84, will be rolled out gradually over the coming days and weeks. This release addresses 16 security vulnerabilities, several of which pose a high risk of remote code execution (RCE), underscoring the importance of updating immediately.
Key Security Vulnerabilities
The Chrome 132 update resolves vulnerabilities across various components of the browser, with five high-severity issues standing out:
- CVE-2025-0434: An out-of-bounds memory access bug in V8, Chrome’s JavaScript engine. This flaw could allow attackers to crash the browser or execute arbitrary code remotely.
- CVE-2025-0435: An inappropriate implementation in Navigation, which could lead to unexpected behavior or potential data exposure.
- CVE-2025-0436: An integer overflow in Skia, Chrome’s graphics engine, potentially exploitable for malicious purposes.
- CVE-2025-0437: An out-of-bounds read in Metrics that could expose sensitive data.
- CVE-2025-0438: A stack buffer overflow in Tracing, which could be leveraged for remote code execution.
Other vulnerabilities addressed include medium and low-severity issues affecting components like Frames, Fullscreen, Payments, Extensions, and Compositing. These fixes address problems such as race conditions, insufficient data validation, and inappropriate implementations.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Google has credited external security researchers for identifying many of these vulnerabilities and awarded bug bounties ranging from $1,000 to $7,000 per issue. Notably:
- A $7,000 bounty was awarded for CVE-2025-0434 (V8 memory access) and CVE-2025-0435 (Navigation flaw).
- A $3,000 reward went to the researcher who identified CVE-2025-0436 (Skia integer overflow).
In addition to externally reported issues, Google’s internal security teams conducted audits and fuzz testing to identify other bugs. Tools like AddressSanitizer and MemorySanitizer played a crucial role in detecting these vulnerabilities.
Why You Should Update
Several of the fixed vulnerabilities could potentially allow attackers to execute malicious code remotely or compromise user data. While Google has not disclosed active exploitation of these flaws in the wild, users are strongly advised to update Chrome to version 132.0.6834.83/84 as soon as possible to mitigate risks.
To update manually:
- Open Chrome.
- Navigate to Help > About Google Chrome.
- Allow the browser to check for updates and install the latest version.
Beyond security fixes, Chrome 132 introduces performance improvements and prepares for upcoming features that will be detailed in future blog posts by Google. The extended stable channel has also been updated to ensure enterprise users benefit from these critical fixes.
This release highlights Google’s ongoing commitment to browser security and user safety. Users are encouraged to stay vigilant and keep their software up-to-date to protect against emerging threats.
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates