March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Google Releases Chrome 132 Stable Version: Addresses Multiple High-Risk Vulnerabilities Enabling Remote Attacks

Google Releases Chrome 132 Stable Version: Addresses Multiple High-Risk Vulnerabilities Enabling Remote Attacks



Google Releases Chrome 132 Stable Version: Addresses Multiple High-Risk Vulnerabilities Enabling Remote Attacks

On January 15, Google officially announced the release of Chrome 132 for its stable channel, providing critical security updates and feature enhancements for Windows, macOS, and Linux users.

This new version, identified as 132.0.6834.83/84, will be gradually rolled out over the coming days and weeks. Among the updates are fixes for 16 security vulnerabilities, including several high-risk issues that could allow remote code execution (RCE).

Google Releases Chrome 132 Stable Version: Addresses Multiple High-Risk Vulnerabilities Enabling Remote Attacks


Highlighted Fixes for Critical Security Issues

Chrome 132 addresses vulnerabilities across various browser components, with five being particularly severe:

  1. CVE-2025-0434: A memory out-of-bounds access vulnerability in Chrome’s V8 JavaScript engine. Exploitation could lead to browser crashes or remote code execution.

  2. CVE-2025-0435: Flaws in the navigation functionality resulting in unexpected behavior or potential data leaks.

  3. CVE-2025-0436: An integer overflow vulnerability in Chrome’s Skia graphics engine that could be exploited for malicious purposes.

  4. CVE-2025-0437: An out-of-bounds read vulnerability in the Metrics component, which might result in sensitive data exposure.

  5. CVE-2025-0438: A stack buffer overflow vulnerability in the Tracing component, which could allow attackers to perform remote code execution.

In addition to the critical issues listed above, medium- and low-severity vulnerabilities were addressed across various components, such as Frames, Fullscreen, Payments, Extensions, and Compositing. These involve problems like race conditions, insufficient data validation, and improper implementation.

Rewards for External Security Researchers

Google acknowledged and rewarded external researchers who reported these vulnerabilities, offering bug bounties ranging from $1,000 to $7,000:

  • CVE-2025-0434 (V8 memory access vulnerability) and CVE-2025-0435 (navigation functionality flaw) garnered $7,000 each.
  • CVE-2025-0436 (Skia integer overflow vulnerability) resulted in a $3,000 reward.

Strong Recommendation to Update

Some of these vulnerabilities could potentially be exploited to execute malicious code remotely or steal user data. Although no active exploitation has been observed in the wild so far, Google strongly recommends users update Chrome to version 132.0.6834.83/84 immediately to minimize the risk.

Other Improvements in Chrome 132

Along with the security fixes, Chrome 132 includes performance optimizations and groundwork for upcoming features. Google plans to elaborate on these new features in future blog posts.

Make sure to update your browser as soon as possible to enjoy improved security and performance while staying ahead of potential threats.


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.