Emergency Chrome 146 replace patches 2 zero-day vulnerabilities
Abstract created by Good Solutions AI
In abstract:
- PCWorld reviews that Google launched an emergency Chrome 146 replace fixing two zero-day vulnerabilities (CVE-2026-3909 and CVE-2026-3910) actively exploited by attackers.
- The replace patches 29 whole safety flaws, together with vital vulnerabilities within the Skia graphics library and V8 JavaScript engine that pose excessive dangers to customers.
- Customers ought to instantly replace to Chrome variations 146.0.7680.75/76 by means of handbook checking since these vulnerabilities are being actively exploited in real-world assaults.
Within the new Chrome variations 146.0.7680.75/76 for Home windows and macOS, and 146.0.7680.75 for Linux, the builders have fastened two safety vulnerabilities. In accordance with Google, each vulnerabilities are already being exploited for assaults within the wild. This replace comes solely a day after Chrome variations 146.0.7680.71/72 for Home windows and macOS, and 146.0.7680.71 for Linux, which fastened one other 29 vulnerabilities.
Within the Chrome Releases weblog put up, Srinivas Sista lists the 2 safety vulnerabilities that have been simply fastened. They have been found internally on February tenth and are categorised as excessive danger.
As a basic rule, Chrome routinely updates when a brand new model is out there. However for those who don’t have it but, you possibly can manually set off the replace by way of the menu merchandise Assist > About Google Chrome.
The zero-day safety vulnerabilities
The primary zero-day safety vulnerability is a bug within the Skia graphics library (CVE-2026-3909) that enables write entry to reminiscence addresses exterior the boundaries of a predefined buffer (“out-of-bounds write”).
The second zero-day vulnerability (CVE-2026-3910) is discovered within the V8 JavaScript engine, described as an “inappropriate implementation.” It stays unclear precisely what was carried out incorrectly and why that is such an issue.
Google is remaining tight-lipped on the character and scale of the assaults exploiting these vulnerabilities.
Vital: Whether or not you retain your browser updated, you want correct antivirus protections if you need your PC to stay safe and personal. Take a look at our picks for one of the best antivirus software program for Home windows in addition to finest VPN companies to remain forward of safety issues.
What else is fastened in Chrome 146?
Simply two days earlier, on March tenth, Google launched the brand new main model Chrome 146, which you’ll examine on this Chrome Releases weblog put up. That replace fastened 29 safety vulnerabilities, virtually all of which have been reported by exterior safety researchers.
One of many vulnerabilities (CVE-2026-3913) is assessed as vital, a buffer overflow within the WebML part. Tobias Wienand, the discoverer of this vulnerability, was rewarded $33,000 for it. He additionally obtained an extra $43,000 for CVE-2026-3915, one other WebML buffer overflow (though that one solely categorised as excessive danger).
Eleven safety vulnerabilities have been recognized as excessive danger, and one other eleven as medium danger. Google has to date awarded over $200,000 to those that found these vulnerabilities. In some circumstances, Google has not but decided the quantity of their respective rewards.
This text initially appeared on our sister publication PC-WELT and was translated and localized from German.

