Overview
- Google confirmed active exploitation of CVE-2025-14174 and urged immediate updating of the browser.
- The release patches two additional high-severity flaws: CVE-2025-14765 in WebGPU (use-after-free) and CVE-2025-14766 in the V8 engine (out-of-bounds read/write).
- Both newly patched vulnerabilities can be triggered by visiting a malicious web page, creating risk during routine browsing until the fix is applied.
- The protected versions are 143.0.7499.146/.147 for Windows and macOS and 143.0.7499.146 for Linux, and the update requires a browser restart to take effect.
- Automatic rollout has begun, but users are advised to check for updates manually as Google withholds full technical details until most users are patched.