Chrome 148 Update Patches Critical Vulnerabilities
Briefly

Chrome 148 Update Patches Critical Vulnerabilities
"Google has not shared details on the flaw, but its severity rating and the paid amount suggest that it could be exploited for remote code execution. The second critical issue is CVE-2026-8510, an integer overflow weakness in Skia that earned the reporting researcher a $25,000 reward. The remaining 12 critical-severity security defects resolved with the latest Chrome refresh were all discovered by Google."
"They include eight use-after-free vulnerabilities in UI, FileSystem, Input, Aura, HID, Blink, Tab Groups, and Downloads, an insufficient validation of untrusted input flaw in DataTransfer, an object lifecycle issue in WebShare, an integer overflow bug in ANGLE, and a race condition in Payments. The Chrome 148 update also resolves 37 high-severity weaknesses, including multiple use-after-free, out-of-bounds write, heap buffer overflow, insufficient validation of untrusted input, integer overflow, insufficient policy enforcement, out-of-bounds read, and type confusion defects."
"Google says it paid $44,000 in bug bounty rewards for four of these flaws (the top two rewards were of $25,000 and $10,000). The final amount might be higher, as the company has yet to disclose the amounts for several other issues. Google makes no mention of any of these issues being exploited in the wild. The latest Chrome iteration is now rolling out as version 148.0.7778.167 for Linux and as versions 148.0.7778.167/168 for Windows and macOS."
"Firefox received a security update as well. Its latest iteration, namely version 150.0.3, resolves five high-severity flaws in JIT, WebAssembly, JavaScript Engine, and Profile Backup. Related: Vulnerability in Claude Extension for"
Chrome 148 resolves 79 vulnerabilities across multiple components, including 14 critical-severity defects. A heap buffer overflow in WebML is tracked as CVE-2026-8509 and received a $43,000 bug bounty. An integer overflow in Skia is tracked as CVE-2026-8510 and received a $25,000 reward. The remaining critical issues include eight use-after-free vulnerabilities across UI, FileSystem, Input, Aura, HID, Blink, Tab Groups, and Downloads, plus insufficient validation of untrusted input in DataTransfer, an object lifecycle issue in WebShare, an integer overflow bug in ANGLE, and a race condition in Payments. The update also fixes 37 high-severity weaknesses and reports $44,000 in bug bounties for four of them. Chrome 148 is rolling out for Linux and for Windows and macOS, and Firefox 150.0.3 fixes five high-severity flaws in JIT, WebAssembly, JavaScript Engine, and Profile Backup.
Read at SecurityWeek
Unable to calculate read time
[
|
]