Chrome Critical Patch: 3 High‑Severity Bugs Fixed – Update Now

technology

Chrome’s latest stable release (version 145.7632.116/117) patches three high‑severity flaws that let a malicious site read TLS private keys, write beyond memory bounds, and corrupt Chrome’s process space—all without any click from you. The bugs are actively exploited, so updating immediately is the only reliable way to keep your browsing sessions secure.

What the Three Vulnerabilities Are

All three issues live in Chrome’s rendering engine, the component that turns web code into what you see on screen. Because the engine runs with elevated privileges, any memory‑safety slip can cascade into a full‑blown breach.

Out‑of‑Bounds Read (CVE‑2026‑3061)

This bug lets Chrome expose memory regions that store TLS private keys and other sensitive data when rendering a crafted page. A malicious site can simply load the page, and the browser unintentionally leaks the secrets that should stay locked away.

Out‑of‑Bounds Write

Similar to the read bug, this flaw allows an attacker to write beyond intended memory limits. The result can be arbitrary code execution or tampering with Chrome’s internal structures, opening the door to broader system compromise.

Additional Memory‑Corruption Path

A third high‑severity flaw provides yet another way to manipulate Chrome’s process space. Though less talked about, it still falls under the “High” rating and can be chained with the other bugs for a potent attack.

Why the Update Can’t Wait

Google’s security team flagged these bugs as “high‑severity” and confirmed they’re exploitable in the wild. Proof‑of‑concept exploits already exist, meaning delaying the patch only raises your risk of a silent takeover.

Impact on Everyday Users

If you keep an older Chrome version, a compromised ad or a rogue site could harvest the encryption keys that protect your HTTPS sessions. Imagine logging into your bank with a “secure” connection while the TLS keys have already been siphoned—your “secure” link becomes a backdoor.

Most people browse without thinking about the underlying code, which is exactly why this patch matters. The update size is modest—a few megabytes—and it’s already live in the Chrome stable channel.

What Enterprises Should Do

IT admins need to push the update through their standard patch‑management tools, whether that’s Windows Update, macOS Software Update, a Linux package manager, or the Play Store for Android devices. Prompt rollout across the fleet keeps the organization’s web surface locked down.

How to Apply the Patch

1. Open Chrome.
2. Go to Settings → About Chrome.
3. Click Update Chrome (or let the browser fetch the latest version automatically).
If you manage multiple machines, trigger the update via your enterprise deployment system today.

Bottom line: Chrome’s new patch fixes three high‑severity bugs that could let attackers read your encryption keys and hijack your system with a single page load. Updating now is the only practical defense—don’t let a delay cost you your data.