March 13, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Google Chrome 146 Patches 29 Vulnerabilities: One Rated Critical

Google Chrome 146 Patches 29 Vulnerabilities: One Rated Critical



Google Chrome 146 Security Update – 29 Vulnerabilities Fixed
Security Dispatch Cybersecurity Intelligence & Vulnerability Reporting
Security Update

Google Chrome 146 Patches 29 Vulnerabilities — One Rated Critical

Google’s latest stable release addresses a critical heap buffer overflow in the WebML engine alongside eleven high-severity flaws, with researchers collecting over $119,000 in bug bounties for their discoveries.

⚠ Action Required: No active exploitation has been confirmed at time of publication, but users should update to Chrome 146.0.7680.71 / .72 immediately. Unpatched memory-corruption flaws can be leveraged for remote code execution simply by visiting a malicious webpage.

Google officially promoted Chrome 146 to the stable channel on March 10, 2026, delivering fixes for 29 tracked security vulnerabilities across its Windows, macOS, and Linux desktop builds. The release — versioned 146.0.7680.71 for Linux and 146.0.7680.71 / 146.0.7680.72 for Windows and macOS — marks one of the more significant patch drops of the year, with memory-corruption bugs dominating the advisory.

The most alarming finding is CVE-2026-3913, a critical-severity heap buffer overflow nestled inside Chrome’s WebML component — the browser’s machine-learning inference layer. Security researcher Tobias Wienand reported the flaw and was awarded a $33,000 bug bounty by Google’s Vulnerability Reward Program. Heap buffer overflows arise when a program writes beyond the bounds of an allocated memory block, potentially overwriting adjacent data structures; in a browser context, this class of bug can enable a remote attacker to execute arbitrary code simply by luring a victim to a weaponised page.

💰
Bug Bounty Highlights
CVE-2026-3913 (critical, WebML) — $33,000 awarded to Tobias Wienand.
CVE-2026-3914 & CVE-2026-3915 (high, WebML) — $43,000 each, making WebML the single most costly component in this cycle.

Full Vulnerability Breakdown

Of the 29 fixes, 25 were assigned public CVE identifiers. The remaining four were internal Google findings not requiring external disclosure. The severity distribution: 1 Critical, 11 High, 11 Medium, and 5 Low.

Critical 1 vulnerability
CVETypeComponent
CVE-2026-3913Heap buffer overflowWebML
High 11 vulnerabilities
CVETypeComponent
CVE-2026-3914Integer overflowWebML
CVE-2026-3915Heap buffer overflowWebML
CVE-2026-3916Out-of-bounds readWeb Speech
CVE-2026-3917Use-after-freeAgents
CVE-2026-3918Use-after-freeWebMCP
CVE-2026-3919Use-after-freeExtensions
CVE-2026-3920Out-of-bounds memory accessWebML
CVE-2026-3921Use-after-freeText Encoding
CVE-2026-3922Use-after-freeMediaStream
CVE-2026-3923Use-after-freeWebMIDI
CVE-2026-3924Use-after-freeWindowDialog
Medium 11 vulnerabilities
CVETypeComponent
CVE-2026-3925Incorrect security UILookalikeChecks
CVE-2026-3926Out-of-bounds readV8
CVE-2026-3927Incorrect security UIPicture-in-Picture
CVE-2026-3928Insufficient policy enforcementExtensions
CVE-2026-3929Side-channel information leakageResourceTiming
CVE-2026-3930Unsafe navigationNavigation
CVE-2026-3931Heap buffer overflowSkia
CVE-2026-3932Insufficient policy enforcementPDF
CVE-2026-3934Insufficient policy enforcementChromeDriver
CVE-2026-3935Incorrect security UIWeb App Installs
CVE-2026-3936Use-after-freeWebView
Low 5 vulnerabilities
CVETypeComponent
CVE-2026-3937Incorrect security UIDownloads
CVE-2026-3938Insufficient policy enforcementClipboard
CVE-2026-3939Insufficient policy enforcementPDF
CVE-2026-3940Insufficient policy enforcementDevTools
CVE-2026-3941Insufficient policy enforcementDevTools
CVE-2026-3942Incorrect security UIPicture-in-Picture

Why These Bugs Matter

The WebML component — Chrome’s built-in layer for running on-device AI inference — appears four times across the critical and high tiers, suggesting the API’s attack surface is drawing serious scrutiny as its adoption grows. Use-after-free (UAF) flaws, which account for the majority of the high-severity findings, are a particularly attractive target for attackers: they allow code to reference memory that has already been freed, a technique routinely used to break out of browser security sandboxes.

If left unpatched, the most severe vulnerabilities in this release could allow a remote attacker to execute arbitrary code on a victim’s machine simply by directing them to a specially crafted webpage — no file download required.

How to Update

Chrome will pull the update automatically in the background, but a manual check and restart is the fastest path to protection:

1
Open Chrome and navigate to chrome://settings/help
2
Chrome will automatically check for and download the latest version.
3
Click Relaunch to apply the update. Your tabs will be restored.
4
Confirm the version reads 146.0.7680.71 or 146.0.7680.72 (Windows/macOS).

The desktop release covers Windows 10/11, macOS, and Linux. Chrome for Android reached early stable rollout on March 5 as version 146.0.7680.65 and will continue its phased rollout to all Android users in the coming days. Chrome for iOS follows a separate schedule via the App Store.

Google has also announced a structural change alongside this release: Chrome’s stable update cycle is moving from four weeks to two weeks, a cadence shift designed to accelerate security patching. The full transition to this rhythm is expected to complete by autumn 2026.

Google Chrome 146 Patches 29 Vulnerabilities: One Rated Critical

Google Chrome 146 Patches 29 Vulnerabilities: One Rated Critical


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.