Chrome 148 Rolls Out With 127 Security Fixes
The fresh browser update resolves critical-severity integer overflow and use-after-free vulnerabilities.

Aggregated from SecurityWeek
This article was automatically aggregated from an external source. Content may be summarized.
Full Analysis
Google on Wednesday announced the promotion of Chrome 148 to the stable channel with 127 security fixes, including three for critical-severity vulnerabilities.
The first critical flaw is an integer overflow issue in Blink, tracked as CVE-2026-7896. It could allow remote attackers to exploit a heap memory corruption via a crafted HTML page.
According to Google’s advisory, a $43,000 bug bounty reward was paid to the researcher who reported the flaw in mid-March.
The other two critical-severity security defects, both use-after-free weaknesses, were found by Google. Tracked as CVE-2026-7897 and CVE-2026-7898, they affect the Mobile and Chromoting components.
Chrome 148 also includes patches for over 30 high-severity vulnerabilities, most of which are use-after-free bugs impacting ANGLE, SVG, DOM, Fullscreen, Views, Aura, GPU, Skia, Passwords, ServiceWorker, Chromoting, WebRTC, PresentationAPI, and MediaRecording.
Per Google’s advisory, the highest bug bounty was paid for an out-of-bounds read and write issue in the V8 JavaScript engine. Project WhatForLunch received a $55.000 reward for the finding.
Advertisement. Scroll to continue reading.
Other high-severity flaws addressed with the update include: heap buffer overflow in ANGLE, out of bounds memory access in V8, out of bounds read in Fonts, integer overflows in ANGLE and GPU, insufficient validation of untrusted input in Media, inappropriate implementation in ServiceWorker, insufficient policy enforcement in DevTools, type confusions in Accessibility and Runtime, insufficient data validation issues in DevTools and InterestGroups, out of bounds write in Skia, and uninitialized use in Dawn.
More than 60 of the security defects patched with the latest Chrome release are medium-severity flaws, while the remaining bugs are low-severity weaknesses.
While most of the addressed vulnerabilities were discovered by Google, the company says it paid $138,000 in bug bounty rewards to external researchers. The final amount could be much higher, as the internet giant has yet to disclose the amounts handed out for many of the resolved issues.
The latest Chrome iteration is now rolling out as version 148.0.7778.96 for Linux and as versions 148.0.7778.96/97 for Windows and macOS.
Related: Critical Remote Code Execution Vulnerability Patched in Android
Related: Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge
Related: Chrome 147, Firefox 150 Security Updates Rolling Out
Originally published by SecurityWeek
Original Source
SecurityWeek