Google Chrome’s Stable channel is being updated to version 137.0.7151.103 for Windows and Mac, with Linux receiving version 137.0.7151.103 as well.
The rollout will take place gradually over the coming days and weeks, ensuring smooth deployment and minimal disruption for users.
The official changelog provides a detailed breakdown of all modifications and enhancements included in this build.
Users are encouraged to check the log for a comprehensive list of changes.
This update is particularly significant for organizations and individuals concerned with browser security, especially those monitoring vulnerabilities in Microsoft Edge, Chrome, and extensions.
Keeping browsers up to date is a critical step in mitigating risks associated with emerging threats.
Two high-severity security vulnerabilities have been addressed in this release.
In line with Google’s coordinated vulnerability disclosure policy, full details and links to bug reports may be temporarily restricted until a majority of users have updated.
This restriction also applies if the vulnerability involves third-party libraries that other projects rely on but have yet to patch.
The specific fixes are as follows:
Google has awarded $8,000 for the discovery of CVE-2025-5958, highlighting its commitment to incentivizing security research.
The company also extends its gratitude to all researchers who helped identify and mitigate vulnerabilities during the development cycle.
Google encourages users to actively participate in the security ecosystem.
Those interested in switching release channels can find instructions on the official Chrome support page.
If users encounter new issues, they are urged to file a bug report.
The Chrome community forum remains a valuable resource for troubleshooting and learning about common problems.
Below is a risk factor table summarizing the vulnerabilities addressed in this update:
CVE ID | Vulnerability Type | Severity | Component | Risk Impact | Reward/Status |
---|---|---|---|---|---|
CVE-2025-5958 | Use after free | High | Media | Arbitrary code execution | $8,000 |
CVE-2025-5959 | Type confusion in V8 | High | V8 (JavaScript) | Remote code execution | Not awarded |
Use-after-free vulnerabilities, such as CVE-2025-5958, occur when a program continues to use a pointer to an object after it has been freed, potentially allowing attackers to manipulate memory and execute malicious code.
Type confusion vulnerabilities, like CVE-2025-5959, arise when an object is treated as a different type than intended, which can be exploited to bypass security checks.
To mitigate these risks, users should ensure automatic updates are enabled for Chrome.
Organizations should also implement robust patch management strategies, especially for critical systems.
Security teams are advised to monitor for indicators of compromise and educate users about phishing techniques and credential stuffing, which remain prevalent threats.
The latest Chrome Stable channel update underscores the importance of timely patching and community collaboration in maintaining a secure browsing environment.
By addressing high-severity vulnerabilities and rewarding researcher contributions, Google continues to set a high standard for browser security.
For more technical details and ongoing updates, users are encouraged to visit the Chrome Security Page and participate in the community forums.
Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates
A critical vulnerability in OpenPGP.js, a widely used JavaScript library for encrypted messaging and digital…
A newly discovered remote access trojan (RAT) named CyberEye is making waves in the cybersecurity community for…
A dramatic escalation in phishing attacks leveraging Adversary-in-the-Middle (AiTM) techniques has swept across organizations worldwide…
A critical security vulnerability in OneLogin’s Active Directory (AD) Connector service has exposed enterprise authentication…
Remote Access Trojans (RATs) like Quasar have been a persistent threat for years, enabling attackers to…
SoftBank has previously experienced significant data breaches. In 2004, the company confirmed that personal information…