Two Chrome flaws could be triggered by simply browsing the web: Update now
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。好的,我先仔细看看这篇文章。 文章主要讲的是Google发布了额外的安全补丁,修复了Chrome浏览器的两个漏洞。这两个漏洞都可以被远程攻击者触发,当用户访问恶意网页时。Chrome用户数量庞大,所以这些漏洞影响深远。文章还提到及时安装补丁的重要性,并指导如何更新Chrome,包括自动更新和手动更新的方法。最后还详细介绍了这两个漏洞的技术细节,比如一个是在WebGPU中的use-after-free漏洞,另一个是在V8引擎中的out-of-bounds读写漏洞。 用户的需求是用中文总结内容,控制在100字以内。所以我要抓住关键点:Google发布补丁修复Chrome的两个安全漏洞,这两个漏洞可被远程攻击利用,影响广泛,建议及时更新浏览器,并提供了更新方法。 现在我需要把这些信息浓缩成一句话,不超过100字。确保涵盖主要信息:补丁、两个漏洞、远程攻击、影响范围、更新建议。 可能的结构是:“Google发布针对Chrome的额外补丁修复两个安全漏洞,这两个漏洞可被远程攻击者利用以访问恶意网页。由于Chrome用户众多(约34亿),及时更新以防范风险至关重要。” 检查一下字数:刚好在100字以内。看起来不错。 </think> Google发布针对Chrome的额外补丁修复两个安全漏洞,这两个漏洞可被远程攻击者利用以访问恶意网页。由于Chrome用户众多(约34亿),及时更新以防范风险至关重要。 2025-12-17 16:2:52 Author: www.malwarebytes.com(查看原文) 阅读量:4 收藏

Google issued an extra patch addressing two security vulnerabilities in Chrome, both of which can be triggered remotely by an attacker when a user visits a specially crafted, malicious web page.

Chrome is by far the world’s most popular browser, with an estimated 3.4 billion users. That makes it a massive target. When Chrome has a security flaw that can be triggered just by visiting a website, billions of users are exposed until they update.

That’s why it’s important to install these patches promptly. Staying unpatched means you could be at risk just by browsing the web. Attackers often try to exploit browser vulnerabilities quickly, before most users have a chance to update. Always let Chrome update itself, and don’t delay restarting it, as updates usually fix exactly this kind of risk.

How to update Chrome

The latest version number is 143.0.7499.146/.147 for Windows and macOS, and 143.0.7499.146 for Linux. So, if your Chrome is on version 143.0.7499.146 or later, it’s protected from these vulnerabilities.

The easiest way to update is to allow Chrome to update automatically, but you can end up lagging behind if you never close your browser or if something goes wrong—such as an extension stopping you from updating the browser.

To update manually, click the More menu (three dots), then go to Settings > About Chrome. If an update is available, Chrome will start downloading it. Restart Chrome to complete the update, and you’ll be protected against these vulnerabilities.

You can also find step-by-step instructions in our guide to how to update Chrome on every operating system.

Chrome is up to date

Technical details

One of the vulnerabilities was found in the WebGPU web graphics API, which allows for graphics processing, games, and more, as well as AI and machine learning applications. This vulnerability, tracked as CVE-2025-14765 is a use-after-free vulnerability that could allow a remote attacker to potentially exploit heap corruption via a crafted HTML page.

Use-after-free is a class of vulnerability caused by incorrect use of dynamic memory during a program’s operation. If, after freeing a memory location, a program does not clear the pointer to that memory, an attacker may be able to use the error to manipulate the program.

Heap corruption occurs when a program inadvertently damages the allocator’s view of the heap, which can lead to unexpected alterations in memory. The heap is a region of memory used for dynamic memory allocation.

The other vulnerability, known as CVE-2025-14766 was—once again—found in the V8 engine as an out-of-bounds read and write.

V8 is the engine that Google developed for processing JavaScript, and it has seen more than its fair share of bugs.

An out-of-bounds read and write vulnerability means an attacker may be able to manipulate parts of the device’s memory that should be out of their reach. Such a flaw allows a program to read or write outside the bounds the program sets, enabling attackers to manipulate other parts of the memory allocated to more critical functions. Attackers could write code to a part of the memory where the system executes it with permissions that the program and user should not have.

In this case, the vulnerability could be exploited when the engine processes specially crafted HTML content, such as a malicious website.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2025/12/two-chrome-flaws-could-be-triggered-by-simply-browsing-the-web-update-now
如有侵权请联系:admin#unsafe.sh