The Stable channel has been updated to version 146.0.7680.177/178 for Windows and Mac, and 146.0.7680.177 for Linux, with the rollout expected to reach all users over the coming days and weeks.
The actively exploited vulnerability, tracked as CVE-2026-5281, is a use-after-free vulnerability in Dawn Chrome’s cross-platform GPU abstraction layer used to implement WebGPU.
Use-after-free bugs occur when a program continues to reference freed memory, potentially allowing attackers to execute arbitrary code or escape the browser sandbox.
Google has officially confirmed active exploitation, stating it “is aware that an exploit for CVE-2026-5281 exists in the wild.” The flaw was discovered and reported by an anonymous researcher on March 10, 2026.
Vulnerability details and technical specifics remain restricted until a majority of users have received the patch, a standard practice Google follows to limit exploit replication.
Beyond the zero-day, this update delivers a sweeping set of 21 security fixes, an unusually large batch that signals significant internal security activity. Of those, 19 are rated High severity and span a wide range of Chrome subsystems.
Notable vulnerabilities patched in this release include:
The sheer concentration of use-after-free bugs spanning Dawn, WebGL, WebCodecs, Web MIDI, WebView, Navigation, and Compositing highlights ongoing memory safety challenges in browser rendering pipelines.
Three of the high-severity patches were reported directly by Google’s internal security teams, suggesting some were identified through proactive threat hunting rather than external disclosure.
All Chrome users running versions prior to 146.0.7680.177 on Linux or 146.0.7680.178 on Windows and Mac are potentially exposed. Given the confirmed in-the-wild exploitation of CVE-2026-5281, enterprise users and security teams should treat this update as a critical priority patch.
To update Chrome immediately, navigate to Menu (⋮) → Help → About Google Chrome. The browser will automatically check for and apply the latest update, then prompt a restart to complete the process. Organizations managing Chrome deployments via policy should push the update through their endpoint management platforms without delay.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post New Chrome Zero-Day Vulnerability Actively Exploited in Attacks — Patch Now appeared first on Cyber Security News.
A juvenile riding a mini-bike in South Beloit was hit by an SUV and taken…
A juvenile riding a mini-bike in South Beloit was hit by an SUV and taken…
Six Flags Great America will host a historic, summer-long 50th anniversary celebration offering families special…
Six Flags Great America will host a historic, summer-long 50th anniversary celebration offering families special…
Magic: The Gathering is a fun hobby, but it’s not a cheap one, making finding…
Production has begun on the live-action streaming series Scooby-Doo: Origins, Netflix announced Friday. The streamer…
This website uses cookies.