Chrome Security Update - Patch for Critical Vulnerabilities that Enables Remote Code Execution
हिंदी में सुनें
Listen to this article in Hindi
Google released Chrome version 143.0.7499.146/.147 to patch critical security flaws that could allow remote code execution. Update now to protect your system.
Google has issued a Chrome update, version 143.0.7499.146/.147, to address serious security vulnerabilities. These flaws could potentially allow attackers to remotely execute code on vulnerable systems.
The update is currently being distributed to Windows and Mac users, while Linux users will receive version 143.0.7499.146. Google anticipates that the full rollout will be completed over the next several days to weeks.
This latest stable release incorporates crucial security fixes for two high-severity vulnerabilities that present substantial risks to users.
Google's Security Patches
Security researchers have flagged these vulnerabilities as particularly dangerous because they could be exploited remotely. The specific vulnerabilities addressed are:
- CVE-2025-14765: Use-After-Free in WebGPU:** This critical flaw resides within Chrome's WebGPU, which handles graphics processing. An anonymous researcher discovered it on September 30, 2025. This vulnerability stems from memory management errors, which could enable attackers to run malicious code by manipulating freed memory. Google has offered a $10,000 bug bounty for reporting this issue, highlighting its severity.
- CVE-2025-14766: Out-of-Bounds Read and Write in V8:** This high-risk vulnerability impacts Chrome's V8 JavaScript engine. Security researcher Shaheen Fazim reported it on December 8, 2025. The flaw allows unauthorized memory access, potentially leading to data theft or the execution of malicious code. Out-of-bounds operations affecting core components like V8 are particularly dangerous because they can impact fundamental browser operations.
Users of Windows and Mac can anticipate that the update will automatically install in the coming weeks. Linux users of Chrome can manually initiate the update process by going to Settings > About Chrome and selecting the option to check for updates immediately.
Google advises users to prioritize this update due to the critical nature of the vulnerabilities it resolves.
Google uses various advanced detection techniques to find and prevent vulnerabilities before they reach stable releases. These methods include AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL. The company also collaborates with external security researchers during development to improve browser security.
To protect against potential exploitation of these vulnerabilities, users should ensure their Chrome installation is up to date. Organizations managing multiple systems should prioritize the deployment of this critical patch.