Google Chrome Update Fixes 21 Flaws, Warns of Actively Exploited Vulnerability
嗯,用户让我用中文总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。好的,我先仔细阅读一下文章。 文章主要讲的是Google发布了Chrome的稳定频道更新,修复了21个安全漏洞。其中包括一个高危的代码走私漏洞,正在被积极利用。更新已经于周三晚上发布。其中有19个是高风险漏洞,两个是中等风险。Google还提到了一些具体的CVE编号和研究人员的贡献。 用户的需求是总结内容,控制在100字以内。我需要抓住关键点:Chrome更新、修复21个漏洞、高危代码走私漏洞、19个高风险、2个中等、以及这些漏洞的影响和建议用户立即更新。 现在我要把这些信息浓缩成一句话,不超过100字。可能的结构是:Google发布Chrome稳定版更新,修复21个漏洞,其中19个高危,包括被利用的代码走私漏洞,建议用户立即安装以防范风险。 检查一下字数:大约75字左右,符合要求。确保没有使用任何开头词,并且信息准确。 </think> Google发布Chrome稳定版更新(版本146.0.7680.177/178),修复21个安全漏洞,其中19个为高危级,包括被积极利用的代码走私漏洞(CVE-2026-5281)。建议用户立即安装以防范潜在威胁。 2026-4-1 11:33:58 Author: thecyberexpress.com(查看原文) 阅读量:4 收藏

Stable Channel Update

Google has released a Stable Channel Update for Chrome, addressing 21 security vulnerabilities, including a high-profile code smuggling vulnerability that is actively being exploited in the wild. The update rolled out on Wednesday night.

Among the 21 security vulnerabilities fixed in this update, one in particular has drawn attention: a code smuggling vulnerability that allows attackers to inject malicious code into Chrome users’ systems. Google confirmed that this vulnerability is currently targeted by threat actors, making the update especially urgent for both individual users and organizations.

The company noted that out of the 21 vulnerabilities, 19 are classified as high-risk, while two are considered medium severity. The awareness of active exploitation in the wild highlights the importance of installing the latest Stable Channel Update as soon as possible.

Details of Chrome Stable Channel Update 

According to Google’s official release, the new Stable Channel Update includes: 

  • Version 146.0.7680.177/178 for Windows and Mac
  • Version 146.0.7680.177 for Linux

The rollout is expected to occur over the coming days and weeks, depending on user configurations and regional distributions.

Google has provided a comprehensive changelog listing all security vulnerabilities patched in this update, though access to certain bug details may remain restricted until a majority of users have installed the fix. This precaution is designed to prevent exploitation of vulnerabilities in third-party libraries that are also used by other projects. 

report-ad-banner

Breakdown of High-Risk Security Vulnerabilities 

The update addresses multiple high-risk vulnerabilities reported by security researchers between March 1 and March 25, 2026. Some of the most notable include: 

  • CVE-2026-5273: Use-after-free in CSS, reported March 18  
  • CVE-2026-5272: Heap buffer overflow in GPU, reported March 11  
  • CVE-2026-5274: Integer overflow in Codecs, reported March 1  
  • CVE-2026-5281: Use-after-free in Dawn, reported March 10 (actively exploited in the wild)  
  • CVE-2026-5287: Use-after-free in PDF, reported March 21  

Other vulnerabilities addressed involve ANGLE, WebUSB, WebCodecs, WebGL, WebView, V8, and multiple components of Chrome’s rendering engine. 

Security Fixes, Exploit Awareness, and Research Contributions 

Google acknowledged the ongoing threat posed by the code smuggling vulnerability, noting that CVE-2026-5281 is actively being exploited.

The company also thanked security researchers who collaborated to identify and report these issues, citing tools such as AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL as key instruments in detecting and mitigating these security vulnerabilities before they reached the stable channel.

By publicly disclosing these vulnerabilities, Google aims to provide transparency while allowing users and organizations to patch their systems promptly. 

Why Users Should Update Immediately 

This Stable Channel Update highlights the ongoing risks posed by security vulnerabilities in widely used software like Chrome. The inclusion of actively exploited issues, such as the code smuggling vulnerability, highlights the potential consequences of delayed updates, which can include unauthorized code execution, data theft, or broader system compromise. 

Users are strongly encouraged to install the latest Chrome update across all devices to reduce exposure to these threats. Regularly updating browsers remains one of the most effective defenses against cyberattacks targeting widely deployed software.


文章来源: https://thecyberexpress.com/chrome-stable-channel-update-security/
如有侵权请联系:admin#unsafe.sh