Cyber Security News

Chrome 134 Launches with Patches for 14 Crash-Inducing Vulnerabilities

Google has rolled out Chrome 134 to the stable channel for Windows, macOS, and Linux, addressing 14 security vulnerabilities—including high-severity flaws that could enable remote code execution or crashes.

The update, version 134.0.6998.35 for Linux, 134.0.6998.35/36 for Windows, and 134.0.6998.44/45 for macOS, follows weeks of testing and includes critical fixes for vulnerabilities in components like V8, PDFium, and Media Stream.

External researchers contributed nine of the patches, earning up to $7,000 in bug bounties, while Google’s internal teams resolved five additional issues through audits and automated tools.

Security Enhancements and External Collaborations

The most severe vulnerability, CVE-2025-1914, earned researchers Zhenghang Xiao and Nan Wang a $7,000 bounty for identifying an out-of-bounds read in Chrome’s V8 JavaScript engine.

This class of vulnerability often allows attackers to bypass security protocols or leak sensitive memory data.

Another critical fix, CVE-2025-1915, patched a path traversal flaw in DevTools that could expose local files, reported by Topi Lassila for a $4,000 reward.

Medium-severity issues dominated the update, including a use-after-free flaw in Profiles (CVE-2025-1916) reported by South Korea’s SSD Labs and an out-of-bounds read in PDFium (CVE-2025-1918) discovered by researcher “asnine.”

Notably, Khalil Zhani received two rewards totaling $3,000 for reporting implementation flaws in Browser UI and Permission Prompts (CVE-2025-1917 and CVE-2025-1923).

CVE IDSeverityVulnerability Description
CVE-2025-1914HighOut-of-bounds read in V8
CVE-2025-1915MediumPath traversal in DevTools
CVE-2025-1916MediumUse-after-free in Profiles
CVE-2025-1917MediumBrowser UI implementation flaw
CVE-2025-1918MediumOut-of-bounds read in PDFium
CVE-2025-1919MediumOut-of-bounds read in Media
CVE-2025-1921MediumMedia Stream implementation flaw
CVE-2025-1922LowSelection implementation flaw
CVE-2025-1923LowPermission Prompts implementation flaw

Internal Safeguards and Ongoing Efforts

Google’s internal security teams addressed five additional vulnerabilities through tools like AddressSanitizer and Control Flow Integrity.

These efforts focused on hardening components such as networking stacks and DOM handling, though specific CVE identifiers remain undisclosed to prevent exploitation.

The company emphasized its commitment to “zero-day prevention” through continuous fuzzing and sandboxing improvements.

The update will deploy incrementally over the coming weeks. Users can manually trigger an update via Chrome > Help > About Google Chrome.

Enterprises on the Extended Stable Channel will receive versions 134.0.6998.36 (Windows) and 134.0.6998.45 (macOS).

Google temporarily restricted access to detailed bug reports until most users install the patches. Researchers are urged to report new issues via Chrome’s bug tracker, with bounties available through the Vulnerability Reward Program.

As exploit chains targeting browsers grow more sophisticated, timely updates are critical. Chrome 134 underscores the balance between open-source collaboration and behind-the-scenes hardening—a model increasingly adopted across the industry.

Collect Threat Intelligence on the Latest Malware and Phishing Attacks with ANY.RUN TI Lookup -> Try for free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Two Cybercriminals Arrested for ATM Jackpotting Scheme

Federal authorities have unveiled details of a sophisticated cybercrime operation targeting financial institutions across four…

20 minutes ago

Black Basta’s Notorious Tactics and Techniques Exposed in Leaked Intel

A significant leak of internal chat logs from the Black Basta ransomware group has provided…

2 hours ago

7 Malicious Go Packages Target Linux & macOS to Deploy Stealthy Malware Loader

Security researchers at Socket have uncovered a sophisticated malware campaign targeting the Go ecosystem. The…

2 hours ago

Cybercriminals Exploit YouTubers to Spread SilentCryptoMiner on Windows Systems

A sophisticated malware campaign has been uncovered, exploiting the growing popularity of Windows Packet Divert…

2 hours ago

Case Study: Gaining Internal Network Access Through Physical Penetration Testing

A recent physical penetration test conducted by cybersecurity firm Hackmosphere, revealed critical security flaws in…

2 hours ago

New Malware ‘Desert Dexter’ Hits Over 900 Victims Worldwide

A newly discovered malicious campaign dubbed "Desert Dexter" has infected approximately 900 victims across multiple…

2 hours ago