GBHackers

Google Warns of New Chrome Zero-Day Under Active Exploitation — Users Urged to Update Immediately


Google has released an urgent security update for its Chrome desktop browser to address 21 vulnerabilities, including a critical zero-day flaw that is actively being exploited in the wild.

Users are strongly urged to update their browsers immediately to version 146.0.7680.177/.178 for Windows and Mac, or 146.0.7680.177 for Linux .

Active Zero-Day Threat

The most severe vulnerability patched in this release is CVE-2026-5281, a high-severity “use after free” memory flaw located within the Dawn component.

Google has explicitly confirmed that an exploit for this specific vulnerability exists in the wild, indicating that threat actors are actively leveraging it in targeted attack campaigns.

This type of memory corruption bug typically allows attackers to execute malicious code or trigger system crashes when a victim visits a compromised website.

Alongside the urgent zero-day patch, Google resolved 20 other security flaws reported by external researchers and internal teams.

The majority of these are high-severity memory safety issues, including multiple heap buffer overflows and use-after-free bugs across essential browser components like WebCodecs, ANGLE, and the V8 JavaScript engine.

Google notes that these fixes were facilitated by advanced internal testing frameworks, such as AddressSanitizer and MemorySanitizer, which help catch severe flaws before they reach the stable channel.

To assist security teams and administrators in tracking the latest patches, below is the complete list of all 21 disclosed CVEs addressed in this Chrome update.

CVE IDSeverityDescriptionReporter
CVE-2026-5272HighHeap buffer overflow in GPUinspector-ambitious
CVE-2026-5273HighUse after free in CSSAnonymous
CVE-2026-5274HighInteger overflow in Codecsheapracer
CVE-2026-5275HighHeap buffer overflow in ANGLEc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-5276HighInsufficient policy enforcement in WebUSBAriel Simon
CVE-2026-5277HighInteger overflow in ANGLEc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-5278HighUse after free in Web MIDIc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-5279HighObject corruption in V8Hyeonjun Ahn
CVE-2026-5280HighUse after free in WebCodecsheapracer
CVE-2026-5281HighUse after free in Dawn86ac1f1587b71893ed2ad792cd7dde32
CVE-2026-5282HighOut of bounds read in WebCodecsc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-5283HighInappropriate implementation in ANGLEsweetchip
CVE-2026-5284HighUse after free in Dawn86ac1f1587b71893ed2ad792cd7dde32
CVE-2026-5285HighUse after free in WebGLc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-5286HighUse after free in Dawnsweetchip
CVE-2026-5287HighUse after free in PDFSyn4pse
CVE-2026-5288HighUse after free in WebViewGoogle
CVE-2026-5289HighUse after free in NavigationGoogle
CVE-2026-5290HighUse after free in CompositingGoogle
CVE-2026-5291MediumInappropriate implementation in WebGLheapracer
CVE-2026-5292MediumOut of bounds read in WebCodecsGoogle

Chrome users are strongly advised to manually check for updates by navigating to their browser settings menu immediately.

Organizations and security teams relying on Chrome-based platforms should prioritize deploying this patch across their environments to safeguard against remote code execution attempts.

The browser will automatically apply the fix upon restarting, effectively closing the window of opportunity for threat actors.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link