Google releases emergency Chrome update to fix 10 security vulnerabilities


Google has shipped a Chrome security update that moves the Stable channel to 145.0.7632.159/160 on Windows and macOS, and 145.0.7632.159 on Linux. Google published the Stable update notice on March 3, 2026, and the rollout will take place over the coming days and weeks.

Google says the release includes 10 security fixes. Three of them carry a Critical severity rating, and the highest-paid fix earned a $33,000 bug bounty.

Google has not reported active exploitation for these bugs in the Stable update post. Google also says it may restrict bug details until most users install the update, which keeps weaponization harder while the patch reaches more devices.

If you run Chrome on managed endpoints, push the update fast. Graphics bugs in ANGLE and Skia can allow out-of-bounds memory access through a crafted page, which can sometimes lead to crashes or more serious outcomes depending on the exploit chain.

Versions and severity at a glance

PlatformNew Stable versionTotal fixesCriticalHigh
Windows, macOS145.0.7632.159/1601037
Linux145.0.7632.1591037

Google lists all 10 fixes in the Chrome Releases bulletin.

The 10 patched CVEs

CVESeverityComponentIssue typeReporter and reward
CVE-2026-3536CriticalANGLEInteger overflowcinzinga, $33,000
CVE-2026-3537CriticalPowerVRObject lifecycleZhihua Yao (KunLun Lab), $32,000
CVE-2026-3538CriticalSkiaInteger overflowSymeon Paraschoudis
CVE-2026-3539HighDevToolsObject lifecycleZhenpeng (Leo) Lin (depthfirst)
CVE-2026-3540HighWebAudioInappropriate implementationDavi Antônio Cruz
CVE-2026-3541HighCSSInappropriate implementationSyn4pse
CVE-2026-3542HighWebAssemblyInappropriate implementationqymag1c
CVE-2026-3543HighV8Inappropriate implementationqymag1c
CVE-2026-3544HighWebCodecsHeap buffer overflowc6eed09fc8b174b0f3eebedcceb1e792
CVE-2026-3545HighNavigationInsufficient data validationGoogle

What users should do

  • Update Chrome: Settings → Help → About Google Chrome, then let Chrome download the update and restart.
  • Update via enterprise tools: push the new Stable build across managed devices as soon as it appears in your update channels.
  • Keep an eye on crash spikes: memory-safety fixes can change stability profiles briefly after rollout.

What enterprise teams should watch

  • Systems that render lots of untrusted content, such as kiosk browsers and shared workstations.
  • Endpoints with GPU-heavy workloads, since two of the Critical issues sit in graphics components.
  • Linux fleets that lag behind, since the Linux version number differs slightly from Windows and macOS.

FAQ

Does Google say attackers already exploit these bugs?

Google does not claim active exploitation in the Stable update bulletin. Google says it may keep bug details restricted until most users update.

Why do graphics bugs matter in Chrome?

The NVD entry for CVE-2026-3536 describes an integer overflow in ANGLE that can lead to out-of-bounds memory access via a crafted HTML page.

Which Chrome versions are affected?

The Canadian Centre for Cyber Security advisory says versions prior to 145.0.7632.159/160 on Windows and macOS, and prior to 145.0.7632.159 on Linux.

How long does rollout take?

Google says the update will roll out over the coming days and weeks.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages