Abstract created by Sensible Solutions AI
In abstract:
- PCWorld reviews that Google Chrome’s newest replace patches 60 safety vulnerabilities, together with two important buffer and integer overflow flaws within the WebML element.
- The replace addresses 14 high-risk vulnerabilities involving reminiscence errors and sort confusion, with Google awarding $118,000 in bounties to safety researchers.
- Customers ought to replace instantly for defense, whereas the replace additionally introduces cross-device tab group syncing performance.
Within the new Chrome variations 147.0.7727.55/56 for Home windows and macOS and 147.0.7727.55 for Linux, the builders have patched 60 safety vulnerabilities. In keeping with Google, none of those vulnerabilities have been exploited within the wild but. Chrome model 148 is predicted to launch in early Could.
What’s new in Chrome 147?
The browser’s “What’s new?” web page lists the flexibility to take tab teams with you to different units as the one new function.
The not too long ago introduced vertical tabs and new studying mode aren’t on this replace. Each new options are slated for this week, however they’re apparently rolling out regularly, not all of sudden.
As a rule, Chrome updates routinely when a brand new model is obtainable. You’ll be able to manually verify for updates by way of the menu choice Assist > About Google Chrome (alternatively, Settings > About Google Chrome).
Google additionally launched Chrome for Android 147.0.7727.49 this week, having already launched Chrome for iOS 147.0.7727.47 final week. The Android model addresses the identical vulnerabilities because the desktop variations. The Prolonged Secure Channel for Home windows and macOS now consists of Chromium model 146.0.7680.188.
Vulnerability after vulnerability
Within the Chrome Releases weblog put up, Srinivas Sista lists the 60 fastened safety vulnerabilities on this replace, virtually all of which have been reported by exterior safety researchers. Two of those vulnerabilities are categorised as important: CVE-2026-5858 is a buffer overflow within the WebML element whereas CVE-2026-5859 an integer overflow in the identical element.
An additional 14 safety vulnerabilities are categorised as excessive danger. These embody a mixture of buffer overflows, use-after-free vulnerabilities, and different reminiscence errors. The oft-surfacing kind confusion error within the V8 JavaScript engine can also be current—two occasions, in actual fact.
Of the remaining vulnerabilities, 20 are categorised as medium danger and 24 as low danger. Google has up to now awarded $118,000 in bounties to the discoverers of the vulnerabilities.
Tip: Whether or not you retain your browser updated, you want correct antivirus protections in order for you your PC to stay safe and personal. Take a look at our picks for the most effective antivirus software program for Home windows in addition to finest VPN providers to remain forward of safety issues.
This text initially appeared on our sister publication PC-WELT and was translated and localized from German.

