Google Patches 79 Chrome Vulnerabilities, Including 14 Critical Flaws


Google has released a major Chrome security update that fixes 79 vulnerabilities, including 14 critical flaws affecting browser components such as WebML, Skia, UI, FileSystem, HID, Blink, ANGLE, Payments, Tab Groups, and Downloads.

The desktop update moves Chrome to version 148.0.7778.167/168 for Windows and Mac, and 148.0.7778.167 for Linux. Google also released Chrome 148.0.7778.167 for Android with the same security fixes as the corresponding desktop release, unless otherwise noted.

Users and administrators should install the update as soon as possible. Google has not announced active exploitation for these specific bugs, but browser vulnerabilities can quickly become targets once security details become public.

What Google fixed in Chrome 148

The May 12 Chrome update addresses a large group of memory-safety and input-validation flaws. These issues can affect how Chrome handles web content, browser UI, files, downloads, graphics, and device-related features.

Google said access to bug details may stay restricted until most users receive the fix. This limits the chance that attackers can quickly study the patches and turn them into working exploits before users update.

The most serious publicly listed issue is CVE-2026-8509, a critical heap buffer overflow in Chrome’s WebML component. Google awarded $43,000 to the external researcher who reported it.

Update detailInformation
Release dateMay 12, 2026
Total security fixes79
Critical vulnerabilities14
Windows and Mac version148.0.7778.167/168
Linux version148.0.7778.167
Android version148.0.7778.167
Highest listed bounty$43,000 for CVE-2026-8509

The critical Chrome vulnerabilities

The 14 critical bugs listed by Google include heap buffer overflows, integer overflows, use-after-free flaws, object lifecycle issues, insufficient validation, and a race condition.

Several of these bug classes can lead to memory corruption. In a browser, memory corruption bugs can become serious because attackers may try to trigger them through a crafted web page.

Google’s public advisory lists the following critical issues fixed in this Chrome 148 update.

CVEComponentIssue type
CVE-2026-8509WebMLHeap buffer overflow
CVE-2026-8510SkiaInteger overflow
CVE-2026-8511UIUse after free
CVE-2026-8512FileSystemUse after free
CVE-2026-8513InputUse after free
CVE-2026-8514AuraUse after free
CVE-2026-8515HIDUse after free
CVE-2026-8516DataTransferInsufficient validation of untrusted input
CVE-2026-8517WebShareObject lifecycle issue
CVE-2026-8518BlinkUse after free
CVE-2026-8519ANGLEInteger overflow
CVE-2026-8520PaymentsRace condition
CVE-2026-8521Tab GroupsUse after free
CVE-2026-8522DownloadsUse after free

Why users should update quickly

Chrome is one of the most targeted applications because users interact with untrusted web content every day. A single malicious page can sometimes trigger a browser flaw if the browser remains unpatched.

Memory bugs such as use-after-free and heap buffer overflow vulnerabilities are especially important. Attackers often look for ways to combine browser memory bugs with sandbox escapes or other flaws to gain deeper access to a system.

Google keeps detailed bug information restricted during the rollout. That gives users time to update before technical details become widely available.

  • Critical browser bugs can be triggered through crafted web content.
  • Use-after-free flaws can allow unsafe access to memory after it has been released.
  • Heap buffer overflows can corrupt memory and may support code execution attacks.
  • Input-validation flaws can let malicious data reach code paths that expect trusted input.
  • Race conditions can expose timing gaps that attackers may manipulate.

How to update Chrome on desktop

Chrome usually updates automatically, but the rollout may take days or weeks to reach every system. Users who want the fix immediately can trigger the update manually.

On Windows, Mac, or Linux, open Chrome and use the About Google Chrome page to check for updates. Chrome will download the new build if it is available for your device.

After the update installs, relaunch the browser. The security fixes do not fully apply to active browser sessions until Chrome restarts.

  1. Open Chrome.
  2. Click the three-dot menu in the top-right corner.
  3. Select Help.
  4. Click About Google Chrome.
  5. Wait for Chrome to check for and install the update.
  6. Click Relaunch when prompted.
  7. Return to the same page and confirm the installed version.

What enterprise admins should do

Enterprise administrators should verify Chrome update status across managed Windows, macOS, Linux, and Android devices. Systems that remain on older Chrome 148 builds or any pre-148.0.7778.167/168 desktop build should move to the patched version.

Admins should also check environments where browser updates may lag, such as virtual desktops, kiosk systems, shared workstations, testing images, and locked-down endpoints.

For managed Android devices, administrators should confirm that Google Play or enterprise mobility management policies push the Chrome 148.0.7778.167 update where applicable.

Admin taskReason
Audit Chrome versionsFind systems that have not received the security update.
Force browser restart where neededChrome must relaunch to complete the update.
Check managed Android devicesThe Android release carries the same corresponding security fixes unless noted.
Review update policiesDelayed update windows can leave users exposed for longer.
Prioritize high-risk usersAdministrators, developers, executives, and finance teams face higher phishing risk.

No zero-day exploitation disclosed

Google’s release note does not say that any of the 79 patched vulnerabilities are being actively exploited. That is still not a reason to delay the update.

Once a security update lands, attackers can study changed code and public CVE records to understand what was fixed. That patch-analysis window creates risk for users who stay on older versions.

The safest approach is to update now, restart Chrome, and confirm that the browser reports the patched version for your operating system.

FAQ

How many vulnerabilities did Google fix in the Chrome 148 update?

Google fixed 79 security vulnerabilities in the May 12, 2026 Chrome 148 stable update, including 14 critical vulnerabilities.

What Chrome version fixes the 79 vulnerabilities?

The fixes are included in Chrome 148.0.7778.167/168 for Windows and Mac, 148.0.7778.167 for Linux, and Chrome 148.0.7778.167 for Android.

What is the most serious Chrome vulnerability listed in the update?

One of the most serious listed issues is CVE-2026-8509, a critical heap buffer overflow in WebML. Google awarded $43,000 for the report.

Are the Chrome 148 vulnerabilities being actively exploited?

Google’s release note does not say that these 79 vulnerabilities are being actively exploited. Users should still update quickly because attackers can study patches after release.

How do I update Google Chrome manually?

Open Chrome, click the three-dot menu, select Help, click About Google Chrome, wait for the update to install, then click Relaunch. After restart, check the same page to confirm the patched version.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages