Web browser: critical security gap in Chrome sealed

The Chrome web browser has been released in an updated version – and thus closes a security gap as critically sorted. Chrome users should ensure that the current version runs with you.

In one Correcting the version of the version of Google’s developer The weaknesses are very scarce, which closes the new version. “Heap-based buffer in codecs”, indicate there, with the CVE entry CVE-2025-3619 and the classification of the risk as “critical“. A concrete CVSS value is missing, as is common with Google’s chrome weakness reports. There are no further details, but it can be derived that processing manipulated multimedia files such as videos can already lead to compromising the device.

The second gap is an use-ferry-free weak point in Chrome’s USB code. The program code incorrectly accesses resources that have previously been released and the content of which is therefore undefined. Often this can be misused for inserting and executing maliccode – apparently in this case, which the risk classification is as “high“Implied for the CVE entry CVE-2025-3620.

The browser versions 135.0.7049.95/96 for MacOS and Windows, 135.0.7049.95 for Linux, 135.0.7049.100 for Android and the Extended Stable version 134.0.6998.205 for MacOS and Windows are currently the current status.

The click on the icon with the three stacked points on the right of the address bar of the browser opens the Chrome menu, under “Help”-“About Google Chrome” you get to the version dialog. This shows the current software version. If updates are available, the dialog loads you down and installs you in order to then request the browser restart to activate the error corrected software. Under Linux, the software management of the distribution used is usually responsible for the update.

The weaknesses are likely to affect other chromium-based web browsers such as Microsoft Edge, and software updates can also be expected for this. They should also use users quickly.

Weaknesses in popular web browsers are the preferred destination of cybercriminals, including about three weeks ago when criminals attacked a chrome security gap in the wild. The update should therefore not be pushed onto the long bench.


Discover more from Apple News

Subscribe to get the latest posts sent to your email.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.