Home » News » Google Fixes 31 Chrome Vulnerabilities, Urges User...

Google Fixes 31 Chrome Vulnerabilities, Urges Users to Update Immediately

Google Fixes 31 Chrome Vulnerabilities, Urges Users to Update Immediately

Add Techlomedia as a preferred source on Google. Preferred Source

Google has released an important security update for its Chrome browser, fixing 31 vulnerabilities that could put users at serious risk. The update was rolled out on April 15, 2026, and includes several critical fixes that require immediate attention.

The latest version of Google Chrome is now 147.0.7727.101/102 for Windows and macOS, and 147.0.7727.101 for Linux. Users are strongly advised to update their browsers as soon as possible.

Out of the 31 vulnerabilities fixed in this update, five are marked as critical. These flaws are considered highly dangerous because they could allow attackers to execute arbitrary code on a user’s system. This means hackers could run malicious programs, access sensitive data, or even take full control of a device without needing admin access.

Most of the critical issues are linked to memory-related bugs such as heap buffer overflows and use-after-free vulnerabilities. These are common attack points that cybercriminals use to break browser security protections.

One of the major vulnerabilities, tracked as CVE-2026-6296, affects the ANGLE graphics engine and was reported by a security researcher. Another issue, CVE-2026-6297, was found in the Proxy component. Additional critical bugs impact the Skia graphics library, the Prerender feature, and the XR component.

Critical Vulnerabilities

CVE IDTypeComponentImpact
CVE-2026-6296Heap buffer overflowANGLECan allow arbitrary code execution and full system compromise
CVE-2026-6297Use-after-freeProxyMay lead to remote code execution or browser takeover
CVE-2026-6298Heap buffer overflowSkiaCan be exploited to run malicious code
CVE-2026-6299Use-after-freePrerenderMay allow attackers to execute code silently
CVE-2026-6358Use-after-freeXRCan lead to code execution and system control

Apart from these, the update also fixes several high-severity issues. These include type confusion bugs in the Turbofan engine and out-of-bounds read problems in the Media component.

High Severity Vulnerabilities

CVE IDTypeComponentImpact
CVE-2026-6359Use-after-freeVideoPossible code execution or crash
CVE-2026-6300Use-after-freeCSSMemory corruption leading to exploits
CVE-2026-6301Type confusionTurbofanCan bypass security and execute code
CVE-2026-6302Use-after-freeVideoRisk of remote code execution
CVE-2026-6303Use-after-freeCodecsMay allow arbitrary code execution
CVE-2026-6304Use-after-freeGraphiteMemory corruption vulnerability
CVE-2026-6305Heap buffer overflowPDFiumCan lead to code execution
CVE-2026-6306Heap buffer overflowPDFiumSame risk of arbitrary code execution
CVE-2026-6307Type confusionTurbofanSecurity bypass and code execution
CVE-2026-6308Out-of-bounds readMediaData leakage or crash
CVE-2026-6309Use-after-freeVizPotential system compromise
CVE-2026-6360Use-after-freeFileSystemExploitable for code execution
CVE-2026-6310Use-after-freeDawnMemory corruption risk
CVE-2026-6311Uninitialized useAccessibilityData leak or instability
CVE-2026-6312Policy issuePasswordsWeak enforcement may expose credentials
CVE-2026-6313Policy issueCORSCross-origin data access risk
CVE-2026-6314Out-of-bounds writeGPUCan lead to code execution
CVE-2026-6315Use-after-freePermissionsPrivilege escalation risk
CVE-2026-6316Use-after-freeFormsPotential exploit via form handling
CVE-2026-6361Heap buffer overflowPDFiumArbitrary code execution risk
CVE-2026-6362Use-after-freeCodecsMemory corruption and exploits
CVE-2026-6317Use-after-freeCastRemote exploitation risk

Google has also rewarded independent security researchers with bug bounties for reporting these issues.

There are also some medium-severity vulnerabilities fixed in this update.

Medium Severity Vulnerabilities

CVE IDTypeComponentImpact
CVE-2026-6363Type confusionV8Limited code execution risk
CVE-2026-6318Use-after-freeCodecsPossible crash or minor exploit
CVE-2026-6319Use-after-freePaymentsRisk in payment handling flows
CVE-2026-6364Out-of-bounds readSkiaPossible data leakage

Security experts warn that such flaws can be used to bypass browser protections. Once exploited, attackers can install malware, deploy ransomware, or gain deeper access to a system. Both individual users and businesses are at risk if they delay the update.

To stay protected, users should update Chrome immediately. You can do this by opening Chrome settings, going to the “About” section, and allowing the browser to check for updates. Once the update is downloaded, restarting the browser will apply the fixes.

Google has also limited access to detailed bug information for now. This is done to prevent attackers from using the details to create exploits before most users update their browsers.

Follow Techlomedia on Google News to stay updated. Follow on Google News

Affiliate Disclosure:

This article may contain affiliate links. We may earn a commission on purchases made through these links at no extra cost to you.

Deepanker Verma

About the Author: Deepanker Verma

Deepanker Verma is the Founder and Editor-in-Chief of TechloMedia. He holds Engineering degree in Computer Science and has over 15 years of experience in the technology sector. Deepanker bridges the gap between complex engineering and consumer electronics. He is also a a known Security Researcher acknowledged by global giants including Apple, Microsoft, and eBay. He uses his technical background to rigorously test gadgets, focusing on performance, security, and long-term value.

Related Posts

Stay Updated with Techlomedia

Join our newsletter to receive the latest tech news, reviews, and guides directly in your inbox.