Categories: Cyber Security News

Critical Chrome Use-After-Free Bug Enables Arbitrary Code Execution

On Tuesday, August 26, 2025, Google announced a new Stable channel update for Chrome Desktop, advancing to version 139.0.7258.154/.155 for Windows and Mac, and 139.0.7258.154 for Linux.

The update will roll out gradually over the coming days and weeks.

Users can review the complete list of code changes in the Chromium Log.

Platform Versions and Deployment Status

The table below summarizes the current Stable channel builds by operating system and their rollout status:

Platform Stable Version Rollout Status
Windows 139.0.7258.154 / .155 Phased deployment
Mac 139.0.7258.154 / .155 Phased deployment
Linux 139.0.7258.154 Phased deployment

Users on all platforms should ensure their browsers update automatically; manual updates can be triggered via Help → About Google Chrome.

Security Fix Details and Acknowledgments

This Stable release includes one critical security fix.

Due to standard practices aimed at preventing exploit attempts before users are protected, detailed bug descriptions and direct patch links remain restricted until the majority of users have received the update.

The lone fix in this cycle addresses a high-severity Use-after-free vulnerability within the ANGLE graphics library:

  • CVE-2025-9478: Use-after-free in ANGLE
    • Severity: Critical
    • Reported by: Google Big Sleep
    • Disclosure date: August 11, 2025

The ANGLE library translates OpenGL ES calls to native APIs on Windows, Mac, and Linux.

A use-after-free flaw in its memory management could enable remote code execution if a malicious web page crafts specific GPU commands.

Google credits the external research team, Google Big Slee, for reporting this issue responsibly.

In addition to the ANGLE fix, Google extends its thanks to all security researchers and community contributors who participated in the development cycle.

Their combined efforts help to maintain Chrome’s robust security posture and prevent vulnerabilities from reaching end users.

How to Get Involved and Report Issues

Users interested in previewing upcoming features can join the Dev channel by following instructions on the Chromium Developers site.

Anyone encountering bugs or regressions is encouraged to file reports at crbug.com. For troubleshooting and community support, visit the Chrome Help Forum.

Google remains committed to frequent updates and timely security patches. Keeping Chrome up to date ensures users benefit from the latest performance enhancements, features, and, most critically, security safeguards.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates

The post Critical Chrome Use-After-Free Bug Enables Arbitrary Code Execution appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Two Iconic Sci-Fi Universes Collide in Predator vs. Planet of the Apes

We've seen the Alien and Predator franchises cross over numerous times across various media, but…

10 minutes ago

Save 50% Off the TSA-Approved Talix 20,000mAh 140W Power Bank, Now Just $49.99

Check out this brand new deal on a high-capacity, high-output power bank with a huge…

10 minutes ago

The Sonos Era 100 Smart Speaker Drops to Just $134 Shipped During the Last Minute Earth Day Sale

It takes more than a single speaker to reproduce an entire soundstage. That's where Sonos'…

10 minutes ago

Poetry Events Planned for Frenchtown and Doylestown

Two upcoming poetry Sangha events aim to engage participants in mindfulness meditation and spiritually-grounded personal…

11 minutes ago

North Korean Hackers Use Fake IT Worker Scheme to Infiltrate Companies and Evade Sanctions

North Korea has been running one of the most quietly effective cyber fraud operations in…

12 minutes ago

Malicious npm Package Turns Hugging Face Into Malware CDN and Exfiltration Backend

A rogue npm package named js-logger-pack has been caught quietly turning Hugging Face, a widely trusted AI…

12 minutes ago

This website uses cookies.