Back to Feed
VulnerabilitiesMay 7, 2026

Chrome 148 Rolls Out With 127 Security Fixes

Chrome 148 released with 127 security fixes including three critical vulnerabilities.

Summary

Google released Chrome 148 to the stable channel with 127 security patches, addressing three critical-severity vulnerabilities: an integer overflow in Blink (CVE-2026-7896) and two use-after-free weaknesses in Mobile and Chromoting (CVE-2026-7897, CVE-2026-7898). The update also patches over 30 high-severity flaws across ANGLE, SVG, V8, and other components, with Google paying $138,000 in bug bounty rewards to external researchers.

Full text

Google on Wednesday announced the promotion of Chrome 148 to the stable channel with 127 security fixes, including three for critical-severity vulnerabilities. The first critical flaw is an integer overflow issue in Blink, tracked as CVE-2026-7896. It could allow remote attackers to exploit a heap memory corruption via a crafted HTML page. According to Google’s advisory, a $43,000 bug bounty reward was paid to the researcher who reported the flaw in mid-March. The other two critical-severity security defects, both use-after-free weaknesses, were found by Google. Tracked as CVE-2026-7897 and CVE-2026-7898, they affect the Mobile and Chromoting components. Chrome 148 also includes patches for over 30 high-severity vulnerabilities, most of which are use-after-free bugs impacting ANGLE, SVG, DOM, Fullscreen, Views, Aura, GPU, Skia, Passwords, ServiceWorker, Chromoting, WebRTC, PresentationAPI, and MediaRecording. Per Google’s advisory, the highest bug bounty was paid for an out-of-bounds read and write issue in the V8 JavaScript engine. Project WhatForLunch received a $55.000 reward for the finding.Advertisement. Scroll to continue reading. Other high-severity flaws addressed with the update include: heap buffer overflow in ANGLE, out of bounds memory access in V8, out of bounds read in Fonts, integer overflows in ANGLE and GPU, insufficient validation of untrusted input in Media, inappropriate implementation in ServiceWorker, insufficient policy enforcement in DevTools, type confusions in Accessibility and Runtime, insufficient data validation issues in DevTools and InterestGroups, out of bounds write in Skia, and uninitialized use in Dawn. More than 60 of the security defects patched with the latest Chrome release are medium-severity flaws, while the remaining bugs are low-severity weaknesses. While most of the addressed vulnerabilities were discovered by Google, the company says it paid $138,000 in bug bounty rewards to external researchers. The final amount could be much higher, as the internet giant has yet to disclose the amounts handed out for many of the resolved issues. The latest Chrome iteration is now rolling out as version 148.0.7778.96 for Linux and as versions 148.0.7778.96/97 for Windows and macOS. Related: Critical Remote Code Execution Vulnerability Patched in Android Related: Google Adjusts Bug Bounties: Chrome Payouts Drop as Android Rewards Rise Amid AI Surge Related: Chrome 147, Firefox 150 Security Updates Rolling Out Related: Claude Mythos Finds 271 Firefox Vulnerabilities Written By Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Gemini CLI Vulnerability Could Have Led to Code Execution, Supply Chain AttackHerd Security Raises $3 Million for AI-Powered Training PlatformIranian APT Intrusion Masquerades as Chaos Ransomware AttackSophisticated Quasar Linux RAT Targets Software DevelopersGovernment, Scientific Entities Hit via Daemon Tools Supply Chain AttackOracle Debuts Monthly Critical Security Patch UpdatesCritical Bug Could Expose 300,000 Ollama Deployments to Information TheftCritical, High-Severity Vulnerabilities Patched in Apache MINA, HTTP Server Latest News Palo Alto Zero-Day Exploited in Campaign Bearing Hallmarks of Chinese State HackingBoost Security Raises $4 Million for SDLC Defense PlatformClaude Code OAuth Tokens Can Be Stolen Through Stealthy MCP HijackingAttackers Could Exploit AI Vision Models Using Imperceptible Image ChangesVendor Says Daemon Tools Supply Chain Attack ContainedAI Coding Agents Could Fuel Next Supply Chain CrisisWebinar Today: Securing Identity Across Humans, Machines and AICisco Patches High-Severity Vulnerabilities in Enterprise Products Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveSumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.John Hernandez has joined BlueVoyant as Chief Executive Officer.More People On The MoveExpert Insights The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) The New Rules of Engagement: Matching Agentic Attack Speed The cybersecurity response to AI-enabled nation-state threats cannot be incremental. It must be architectural. (Nadir Izrael) Flipboard Reddit Whatsapp Whatsapp Email

Indicators of Compromise

  • cve — CVE-2026-7896
  • cve — CVE-2026-7897
  • cve — CVE-2026-7898

Entities

Google (vendor)Chrome (product)Blink (product)V8 (product)