How To Repair Google Chrome’s 14 New Essential Safety Vulnerabilities


Google has lastly launched particulars of no fewer than 79 safety points affecting the Chrome internet browser throughout Android, Linux, macOS and Home windows, following a Might 12 announcement that extra data can be coming shortly. That data contains the truth that a complete of 14 of those safety vulnerabilities have a severity ranking of vital. Fixing them as quickly as doable is, in fact, a given. However with a warning that the related Google Chrome safety replace will likely be rolling out to customers quickly, slightly than instantly, how will you greatest do this? Don’t fear, we’ve obtained you coated: listed here are your Chrome replace choices, together with the all-important methodology to leap the queue and get that very important browser safety proper now.

ForbesGoogle Targets Caller ID Spoofing As Rip-off Losses Attain $980 Million Yearly

How To Repair Google Chrome Proper Now As an alternative Of Ready For The Replace To Attain You

Some Google safety points will not be simple to repair, as has change into all too apparent this week. On Might 12, I reported how a harmful architectural flaw was leaving Gmail customers liable to assault with out an apparent repair, and simply yesterday I revealed how Google has mentioned it gained’t repair an Android 16 VPN bypass vulnerability. Fortunately, it’s rather a lot simpler to get protected against new safety points if you’re a Chrome browser person.

Google commonly updates Chrome when safety vulnerabilities have been disclosed, the newest being detailed in a Might 12 posting Google’s Srinivas Sista. It took a few days for the rationale for that replace to change into obvious; nonetheless, with particulars of 79 safety vulnerabilities, sure, you learn that proper, being added on Might 15. Of those, a complete of 14 of the Frequent Vulnerabilities and Exposures have been given a Frequent Vulnerability Scoring System severity ranking of vital, which is sort of as unhealthy as it may possibly get. It might solely be worse if any have been being actively exploited by attackers already, so-called zero-day exploits, however none have been labeled as such. There may be, nonetheless, a caveat right here: the updates “will roll out over the approaching days/weeks,” Sista confirmed.

The excellent news is that Chrome will mechanically replace as quickly because the replace reaches you, and you’ll be protected as soon as the browser is restarted. The higher information is you can keep away from any delay and leap the queue utilizing this actually easy methodology:

  • In your browser, click on on the three-dot menu and choose Assist|About Google Chrome.
  • It will kickstart the safety replace course of and start downloading the brand new model. Within the present case, it will deliver your Chrome browser to model 148.0.7778.167/168.
  • As soon as the obtain has been put in, observe the directions to restart your browser, as that is essential to activate the protections. Don’t fear, your open tabs must be saved and can reopen while you restart.

ForbesGoogle Play ‘Present Calls And SMS For Any Cellphone Quantity’ Rip-off Cons Thousands and thousands

The 14 CVEs, that earned safety researchers a complete of $68,000 in bug bounty reward funds for accountable disclosure to Google, are listed as follows:

  1. CVE-2026-8509: Heap buffer overflow in WebML
  2. CVE-2026-8510: Integer overflow in Skia.
  3. CVE-2026-8511: Use after free in UI.
  4. CVE-2026-8512: Use after free in FileSystem.
  5. CVE-2026-8513: Use after free in Enter.
  6. CVE-2026-8514: Use after free in Aura.
  7. CVE-2026-8515: Use after free in HID.
  8. CVE-2026-8516: Inadequate validation of untrusted enter in DataTransfer.
  9. CVE-2026-8517: Object lifecycle subject in WebShare.
  10. CVE-2026-8518: Use after free in Blink.
  11. CVE-2026-8519: Integer overflow in ANGLE.
  12. CVE-2026-8520: Race in Funds.
  13. CVE-2026-8521: Use after free in Tab Teams.
  14. CVE-2026-8522: Use after free in Downloads.

Yow will discover equally restricted particulars of all 79 safety points within the official Chrome security update announcement. Google says that it restricts entry to vulnerability particulars and hyperlinks “till a majority of customers are up to date with a repair.” Speaking of which, now go and observe the steps listed earlier on this article and just be sure you are one among them.