Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Google Chrome Update: Fixes 29 Security Vulnerabilities

Google Chrome Update: Fixes 29 Security Vulnerabilities

Posted on March 12, 2026 By CWS

Google has announced the release of Chrome version 146, introducing essential security updates for users across Windows, Mac, and Linux platforms. This update addresses 29 critical vulnerabilities, underlining the importance of maintaining browser security.

Patch Details and Major Vulnerabilities

The new Chrome 146.0.7680.71 release for Linux and version 146.0.7680.71/72 for Windows and Mac is set to roll out in the coming days. Among the addressed vulnerabilities, several could permit remote attackers to execute arbitrary code, compromise system integrity, or facilitate denial-of-service attacks.

One of the most critical issues resolved is CVE-2026-3913, a heap buffer overflow in the WebML component. Discovered by security researcher Tobias Wienand, this flaw was awarded a $33,000 bug bounty. Such overflows occur when data surpasses allocated memory capacity, potentially allowing malicious actors to execute remote code by directing users to specially crafted web pages.

High-Severity Flaws and Fixes

In addition to the critical flaw, 11 high-severity vulnerabilities were patched. The WebML API was notably targeted, with two high-severity vulnerabilities (CVE-2026-3914 and CVE-2026-3915) earning $43,000 each in rewards. Other significant patches addressed out-of-bounds read and use-after-free (UAF) vulnerabilities, which attackers often exploit to bypass browser security measures.

Key high-severity corrections include:

  • CVE-2026-3916: Out-of-bounds read in Web Speech component.
  • CVE-2026-3917 & CVE-2026-3918: Use-after-free issues in Agents and WebMCP components.
  • CVE-2026-3919: Use-after-free bug in Chrome Extensions.
  • CVE-2026-3921 to CVE-2026-3924: Multiple UAF bugs affecting TextEncoding, MediaStream, WebMIDI, and WindowDialog.

Additional Vulnerabilities and Security Measures

The update also mitigates several medium and low-severity issues, including incorrect security UI implementations and insufficient policy enforcement in various components. Google has rewarded over $150,000 in bug bounties to researchers who identified these vulnerabilities.

To prevent exploitation, Google restricts access to specific bug details until a majority of users have updated their browsers. This strategy helps safeguard against attacks that might exploit newly disclosed vulnerabilities.

Ensuring your browser is up-to-date is vital for security. Users can update Google Chrome by accessing the three-dot menu, selecting “Help,” and clicking “About Google Chrome.” The browser will then check for updates, automatically installing version 146. A restart is necessary to activate the new security measures.

Stay informed with our daily cybersecurity updates by following us on Google News, LinkedIn, and X. Contact us to share your cybersecurity stories.

Cyber Security News Tags:browser update, bug bounty, Chrome update, Cybersecurity, Google, heap buffer overflow, high severity, patch release, remote code execution, security vulnerabilities, software update, use-after-free, web security

Post navigation

Previous Post: CISA Warns of Active n8n Vulnerability Exploitation
Next Post: Microsoft Office Flaw Allows Dangerous Code Execution

Related Posts

Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered Yurei Ransomware File Encryption, Operation Model and Data Transfer Methods Uncovered Cyber Security News
AuraStealer Malware Emerges with Expanding C2 Network AuraStealer Malware Emerges with Expanding C2 Network Cyber Security News
CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions CyberVolk Ransomware Attacking Windows System in Critical Infrastructure and Scientific Institutions Cyber Security News
New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware New ClickFix Attack Targeting Windows and macOS Users to Deploy Infostealer Malware Cyber Security News
Judge Demands OpenAI to Release 20 Million Anonymized ChatGPT Chats in AI Copyright Dispute Judge Demands OpenAI to Release 20 Million Anonymized ChatGPT Chats in AI Copyright Dispute Cyber Security News
Top 10 Smart Contract Risks in 2026 by OWASP Top 10 Smart Contract Risks in 2026 by OWASP Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Office Flaw Allows Dangerous Code Execution
  • Google Chrome Update: Fixes 29 Security Vulnerabilities
  • CISA Warns of Active n8n Vulnerability Exploitation
  • Google Finalizes Historic $32 Billion Wiz Acquisition
  • Enhancing Vulnerability Management in the AI-Driven Era

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News