Cyber Security News

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities

Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws that could enable remote code execution or crashes.

The update, version 134.0.6998.35 for Linux, 134.0.6998.35/36 for Windows, and 134.0.6998.44/45 for macOS, follows weeks of testing and includes critical fixes for vulnerabilities in components like V8, PDFium, and Media Stream.

External researchers contributed nine of the patches, earning up to $7,000 in bug bounties, while Google’s internal teams resolved five additional issues through audits and automated tools.

Security Enhancements and External Collaborations

The most severe vulnerability, CVE-2025-1914, earned researchers Zhenghang Xiao and Nan Wang a $7,000 bounty for identifying an out-of-bounds read in Chrome’s V8 JavaScript engine.

This class of vulnerability often allows attackers to bypass security protocols or leak sensitive memory data.

Another critical fix, CVE-2025-1915, patched a path traversal flaw in DevTools that could expose local files, reported by Topi Lassila for a $4,000 reward.

Medium-severity issues dominated the update, including a use-after-free flaw in Profiles (CVE-2025-1916) reported by South Korea’s SSD Labs and an out-of-bounds read in PDFium (CVE-2025-1918) discovered by researcher “asnine.”

Notably, Khalil Zhani received two rewards totaling $3,000 for reporting implementation flaws in Browser UI and Permission Prompts (CVE-2025-1917 and CVE-2025-1923).

CVE IDSeverityVulnerability Description
CVE-2025-1914HighOut-of-bounds read in V8
CVE-2025-1915MediumPath traversal in DevTools
CVE-2025-1916MediumUse-after-free in Profiles
CVE-2025-1917MediumBrowser UI implementation flaw
CVE-2025-1918MediumOut-of-bounds read in PDFium
CVE-2025-1919MediumOut-of-bounds read in Media
CVE-2025-1921MediumMedia Stream implementation flaw
CVE-2025-1922LowSelection implementation flaw
CVE-2025-1923LowPermission Prompts implementation flaw

Internal Safeguards and Ongoing Efforts

Google’s internal security teams addressed five additional vulnerabilities through tools like AddressSanitizer and Control Flow Integrity.

These efforts focused on hardening components such as networking stacks and DOM handling, though specific CVE identifiers remain undisclosed to prevent exploitation.

The company emphasized its commitment to “zero-day prevention” through continuous fuzzing and sandboxing improvements.

The update will deploy incrementally over the coming weeks. Users can manually trigger an update via Chrome > Help > About Google Chrome.

Enterprises on the Extended Stable Channel will receive versions 134.0.6998.36 (Windows) and 134.0.6998.45 (macOS).

Google temporarily restricted access to detailed bug reports until most users install the patches. Researchers are urged to report new issues via Chrome’s bug tracker, with bounties available through the Vulnerability Reward Program.

As exploit chains targeting browsers grow more sophisticated, timely updates are critical. Chrome 134 underscores the balance between open-source collaboration and behind-the-scenes hardening—a model increasingly adopted across the industry.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

19 hours ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

19 hours ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

19 hours ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

19 hours ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

19 hours ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

1 day ago