Chrome 142 Update Patches 20 Security Flaws Enabling Code Execution


Google has released Chrome version 142 to the stable channel, addressing multiple critical security vulnerabilities that could allow attackers to execute malicious code on affected systems.

The update, now rolling out to Windows, Mac, and Linux users, contains fixes for 20 security flaws discovered by external researchers and Google’s internal security teams.

Overview of the Vulnerabilities

The Chrome 142 release tackles seven high-severity vulnerabilities, with several affecting the V8 JavaScript engine that powers Chrome’s web rendering capabilities.

CVE IDSeverityVulnerability Type
CVE-2025-12428HighType Confusion in V8
CVE-2025-12429HighInappropriate Implementation in V8
CVE-2025-12430HighObject Lifecycle Issue in Media
CVE-2025-12431HighInappropriate Implementation in Extensions
CVE-2025-12432HighRace Condition in V8
CVE-2025-12433HighInappropriate Implementation in V8
CVE-2025-12036HighInappropriate Implementation in V8
CVE-2025-12434MediumRace Condition in Storage
CVE-2025-12435MediumIncorrect Security UI in Omnibox
CVE-2025-12436MediumPolicy Bypass in Extensions
CVE-2025-12437MediumUse After Free in PageInfo
CVE-2025-12438MediumUse After Free in Ozone
CVE-2025-12439MediumInappropriate Implementation in App-Bound Encryption
CVE-2025-12441MediumOut of Bounds Read in V8
CVE-2025-12443MediumOut of Bounds Read in WebXR
CVE-2025-12440LowInappropriate Implementation in Autofill
CVE-2025-12444LowIncorrect Security UI in Fullscreen UI
CVE-2025-12445LowPolicy Bypass in Extensions
CVE-2025-12446LowIncorrect Security UI in SplitView
CVE-2025-12447LowIncorrect Security UI in Omnibox

Two of the most critical flaws, CVE-2025-12428 and CVE-2025-12429, earned researchers $50,000 bounties each for discovering type confusion and inappropriate implementation issues in V8.

These vulnerabilities could potentially enable attackers to execute arbitrary code by exploiting how Chrome processes JavaScript.

Man Yue Mo from GitHub Security Lab identified the type confusion vulnerability in V8, while researcher Aorui Zhang uncovered the inappropriate implementation flaw.

Additional high-severity issues include an object lifecycle problem in Media components, race conditions in V8, and inappropriate implementation flaws.

Notably, Google’s Big Sleep security initiative contributed several discoveries, demonstrating the effectiveness of automated vulnerability detection systems.

Beyond the critical flaws, Chrome 142 resolves eight medium-severity vulnerabilities affecting various browser components.

These include use-after-free vulnerabilities in PageInfo and Ozone, race conditions in Storage, and out-of-bounds read issues in V8 and WebXR.

Security researchers also identified policy bypass weaknesses in Extensions and incorrect security UI implementations in Omnibox that could mislead users about website authenticity.

The update also patches five low-severity vulnerabilities related to incorrect security UI displays and policy bypass issues in Extensions.

Google awarded security bounties totalling over $140,000 to external researchers who responsibly disclosed these vulnerabilities, reinforcing the company’s commitment to its vulnerability rewards program.

Chrome 142.0.7444.59 for Linux, version 142.0.7444.60 for Windows, and version 142.0.7444.60 for Mac will be automatically deployed to users over the coming days and weeks.

Google continues to restrict access to detailed bug information until most users have received the security patches, thereby preventing potential exploitation of unpatched systems.

Organisations running Chrome in enterprise environments should prioritise testing and deploying this update to maintain a secure posture.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link