
The Chrome team has just rolled out its latest stable channel update (version 136) for Windows, Mac, and Linux, and while it brings the usual dose of under-the-hood improvements, the spotlight is firmly on the eight crucial security fixes bundled within.
Among the fixes, a particularly concerning vulnerability has been addressed: CVE-2025-4096, a high-severity heap buffer overflow existing within Chrome’s HTML rendering engine. This flaw, discovered and reported anonymously, 2025, could potentially allow malicious actors to exploit a weakness in how Chrome processes web pages. A successful exploit could lead to serious consequences, including arbitrary code execution – meaning attackers could potentially gain control of your system. The Chrome team has acknowledged the severity by awarding a $5000 bounty for its discovery.
This release also tackles several medium and low-severity issues, primarily within the DevTools:
- CVE-2025-4050 (Medium): An out-of-bounds memory access vulnerability in DevTools, reported anonymously.
- CVE-2025-4051 (Medium): Insufficient data validation within DevTools, discovered by Daniel Fröjdendahl.
- CVE-2025-4052 (Low): An inappropriate implementation in DevTools, reported by vanillawebdev.
Users are strongly advised to update Chrome to the latest version immediately to protect against these vulnerabilities. Automatic updates are typically enabled by default, but users can verify their browser version by navigating to: chrome://settings/help.
Google emphasizes that bug details will remain limited until the majority of users are secured, and further restrictions may apply if the vulnerabilities affect shared third-party libraries.
Related Posts:
- Malicious Chrome Extension Infects Over 100,000 Users
- Chrome will no longer flag HTTPS pages as secure sites