Google fixes critical Chrome flaws that could allow remote code execution


Google has released a Chrome security update for Windows, macOS, and Linux to fix 30 vulnerabilities, including multiple critical flaws that could allow remote attackers to execute code through malicious web content.

The Stable channel has been updated to 147.0.7727.137/138 for Windows and macOS, and 147.0.7727.137 for Linux. Google says the update will roll out gradually over the coming days and weeks.

The most serious issues fixed in this release are use-after-free vulnerabilities in browser components such as Canvas, iOS, Accessibility, and Views. These memory safety bugs can let attackers abuse freed memory and potentially run code inside the browserโ€™s security boundary.

What happened

Google published the Chrome desktop update on April 28, 2026. The release includes 30 security fixes, with several marked critical or high severity.

The highest-profile flaw is CVE-2026-7363, a critical use-after-free vulnerability in Canvas. Google credited researcher heapracer and awarded a $7,000 bounty for the report.

Google also highlighted critical use-after-free flaws in iOS, Accessibility, and Views. Several high-severity bugs were fixed in GPU, ANGLE, Animation, Navigation, Skia, Media, MHTML, WebMIDI, Cast, Codecs, WebRTC, V8, Chromoting, Tint, Feedback, and WebView.

At a glance

ItemDetails
ProductGoogle Chrome desktop
Update dateApril 28, 2026
Windows version147.0.7727.137/138
macOS version147.0.7727.137/138
Linux version147.0.7727.137
Total security fixes30
Most severe classCritical use-after-free vulnerabilities
Main riskRemote code execution through crafted web content
Known active exploitationGoogleโ€™s release note does not list active exploitation for these flaws

Critical flaws fixed in this release

CVEComponentIssue typeSeverityReward
CVE-2026-7363CanvasUse after freeCritical$7,000
CVE-2026-7361iOSUse after freeCriticalNot available
CVE-2026-7344AccessibilityUse after freeCriticalNot available
CVE-2026-7343ViewsUse after freeCriticalNot available

Why use-after-free bugs are dangerous

A use-after-free vulnerability happens when software continues to use memory after it has already been released. Attackers can sometimes place controlled data into that freed memory space.

In a browser, this kind of memory corruption can become dangerous when a user visits a crafted webpage. If exploitation succeeds, the attacker may execute code inside Chromeโ€™s sandboxed browser process.

That does not always mean full system takeover on its own. However, browser memory bugs can become more serious when attackers combine them with other vulnerabilities or sandbox escape techniques.

High-severity issues also patched

Google also fixed many high-severity flaws in this release. One of the most notable is CVE-2026-7333, a use-after-free issue in the GPU component that earned a $16,000 reward.

Other high-severity issues affect components used for rendering, media playback, browser navigation, device communication, remote access, and web platform features. These areas process complex untrusted content from websites and browser sessions.

That makes rapid updating important. Even if Google restricts full bug details at first, attackers often reverse-engineer patches after release to understand what changed.

Selected high-severity fixes

CVEComponentIssue type
CVE-2026-7333GPUUse after free
CVE-2026-7360CompositingInsufficient validation of untrusted input
CVE-2026-7359ANGLEUse after free
CVE-2026-7358AnimationUse after free
CVE-2026-7353SkiaHeap buffer overflow
CVE-2026-7351MHTMLRace condition
CVE-2026-7337V8Type confusion
CVE-2026-7347ChromotingUse after free

Why Google restricts bug details

Google says access to bug details and exploit links may remain restricted until most users receive the fix. This is a normal security practice after browser patches.

Publishing full technical details too early can help attackers build working exploits against people who have not updated yet. Delaying those details gives users, companies, and managed environments more time to patch.

This matters for Chrome because the browser has a very large user base. Even a short patch delay can leave millions of systems exposed to newly understood attack techniques.

How users can update Chrome

Chrome usually updates automatically, but users should check manually because browser updates only fully apply after a restart.

  1. Open Google Chrome.
  2. Click the three-dot menu in the top-right corner.
  3. Go to Help.
  4. Click About Google Chrome.
  5. Wait for Chrome to check for updates.
  6. Click Relaunch when the update finishes.

After restarting, users should confirm that Chrome shows version 147.0.7727.137, 147.0.7727.138, or a later version.

What administrators should do

Enterprise administrators should prioritize deployment across Windows, macOS, and Linux endpoints. Managed browsers can lag behind consumer updates if update policies, restart behavior, or software deployment windows slow the rollout.

Administrators should also review browser inventory to identify systems running older Chrome builds. Devices used by executives, developers, finance teams, and customer support staff should receive priority because they often handle sensitive web sessions.

Chrome-based browsers may also need separate attention. Organizations should check their full browser fleet, not only Google Chrome installations.

Enterprise checklist

  • Deploy Chrome 147.0.7727.137/138 or later across managed endpoints.
  • Force browser restarts where policy allows.
  • Verify update status through endpoint management tools.
  • Prioritize high-risk users and internet-facing roles.
  • Review Chrome update policies for paused or delayed channels.
  • Check Linux systems separately, especially developer workstations.
  • Monitor security advisories for Chromium-based browser updates.
  • Educate users not to postpone browser relaunch prompts.

Why this matters

Chrome is one of the most exposed applications on a computer because it constantly processes untrusted web content. A malicious webpage, ad, attachment preview, or redirected link can reach the browser before most users notice anything unusual.

Memory safety vulnerabilities in browser components deserve fast patching because attackers can study patches and look for ways to target outdated systems.

For most users, the fix is straightforward. Update Chrome, restart the browser, and avoid delaying future browser restart prompts after security updates.

FAQ

What Chrome version fixes these vulnerabilities?

Google updated Chrome to 147.0.7727.137/138 for Windows and macOS, and 147.0.7727.137 for Linux.

How many vulnerabilities did Google fix?

Google says this Chrome desktop update includes 30 security fixes.

Which vulnerability is the most notable?

CVE-2026-7363 is one of the most notable issues. It is a critical use-after-free vulnerability in Canvas.

Can these flaws allow remote code execution?

Yes. Some of the vulnerabilities can allow remote code execution in the browser context when a vulnerable user visits specially crafted web content.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages