A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update as millions of users worldwide face potential threats of data theft and unauthorized access.
The newly released Stable channel update—now available as version 135.0.7049.95/.96 for Windows and Mac, and 135.0.7049.95 for Linux—is being rolled out over the next few days and weeks, with users strongly advised to update immediately.
Multiple Security Flaws Discovered
This update addresses two major security flaws, with the most severe identified as CVE-2025-3619, a heap buffer overflow vulnerability found in Chrome’s Codecs component.
Discovered and reported by security researcher Elias Hohl on April 9, 2025, this critical issue could enable attackers to execute arbitrary code, potentially allowing them to steal sensitive data, hijack browsing sessions, or gain unauthorized access to user accounts.
The second high-severity vulnerability, CVE-2025-3620, involves a use-after-free bug in Chrome’s USB functionality.
Reported by security researcher @retsew0x01 on March 21, 2025, this flaw could let attackers launch further exploits or cause the browser to crash unexpectedly.
Vulnerability ID | Severity | Description | Impact |
CVE-2025-3619 | Critical | Heap buffer overflow (memory flaw) | Possible data theft, code execution |
CVE-2025-3620 | High | Use-after-free bug (memory management flaw) | Potential crashes, further exploitation |
Heap buffer overflow vulnerabilities like CVE-2025-3619 are particularly dangerous.
If exploited, they may allow malicious actors to bypass Chrome’s security mechanisms, gain foothold over affected devices, and extract confidential information ranging from login credentials to financial data.
Meanwhile, use-after-free bugs can make Chrome unstable and open doors to additional attacks.
Given Chrome’s widespread usage across platforms and its integration into everyday workflows, these vulnerabilities represent a significant risk to both individual users and organizations.
Google has restricted access to specific bug details and technical links to prevent exploitation until the majority of Chrome users receive the fix.
The company also maintains restrictions if the vulnerability exists within third-party libraries that are crucial to multiple software projects.
Google’s Chrome Security Team has extended its gratitude to external researchers for their vital role in discovering and reporting these bugs, citing detection methods like AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL as essential tools in their efforts.
All Chrome users are urged to update their browsers immediately by navigating to Settings > Help > About Google Chrome.
This ensures protection against known vulnerabilities. Users who encounter new issues are encouraged to report them promptly.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!