Google Chrome Emergency Security Update Fixes High-Severity Vulnerabilities

An emergency security update was recently released for Google Chrome, and it’s more important than a typical routine patch. This update addresses multiple high-severity vulnerabilities that could potentially be abused by attackers if left unpatched. Because Chrome is one of the most widely used browsers globally, even a small flaw can have wide-scale impact.

The patched versions include:

  • 145.0.7632.116 / 145.0.7632.117 for Windows and macOS
  • 144.0.7559.116 for Linux

If you’re running an older version, updating should be a priority.

What Was Fixed?

Google’s urgent Chrome update includes fixes for this high-severity bug:

This emergency release resolves three major security issues, all rated as high severity.

1. Out-of-Bounds Read in the Media Component

One of the vulnerabilities affects Chrome’s media processing component. An out-of-bounds read occurs when software accesses memory outside its intended range. While that might sound technical, it can allow attackers to trigger crashes or potentially gather sensitive information from memory in certain scenarios.

2. Out-of-Bounds Read/Write in WebGPU (Tint Compiler)

Another flaw was discovered in Chrome’s WebGPU implementation, specifically within the Tint shader compiler. WebGPU is designed to give web applications advanced graphics capabilities by interacting more directly with a device’s GPU. Memory read/write issues in this layer are particularly serious because they may open the door to memory corruption — a common stepping stone toward arbitrary code execution.

3. Inappropriate Implementation in DevTools

The third issue involves Chrome DevTools. While developer tools aren’t typically exposed to everyday browsing activity, implementation flaws can still introduce security weaknesses, especially if chained with other vulnerabilities.

Why This Update Matters

High-severity bugs often don’t immediately come with full public technical details. That’s intentional. Security teams commonly restrict disclosure while patches are still rolling out to prevent attackers from reverse-engineering the fixes and developing working exploits.

When a browser update is labeled “emergency,” it usually means the risks are significant enough that delaying installation increases exposure.

How to Update

To make sure you’re protected:

  1. Open Chrome
  2. Navigate to Menu → Help → About Google Chrome
  3. Allow the update to download
  4. Relaunch the browser

Keeping your browser up to date remains one of the simplest and most effective cybersecurity habits. Even if everything appears to be working fine, unseen vulnerabilities may still exist under the surface — and updates are what quietly close those gaps.

Comments

Leave a comment