Google patches two Chrome zero-days under active attack. Update now
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不要用“文章内容总结”或“这篇文章”这样的开头。首先,我得仔细阅读这篇文章,理解其主要信息。 文章讲的是Google发布了针对Chrome桌面版的紧急安全更新,修复了两个高危零日漏洞。这两个漏洞都可以远程利用,只需用户访问恶意网站即可。攻击复杂度低,风险较高。然后介绍了如何更新Chrome,包括自动更新和手动更新的方法,并提供了版本号。技术细节部分提到这两个漏洞分别是CVE-2026-3909和CVE-2026-3910,分别涉及Skia和V8引擎的问题。最后给出了一些安全建议,比如不要点击不明链接、启用自动更新等。 接下来,我需要把这些信息浓缩到100字以内。重点包括:Google发布紧急更新、修复两个高危零日漏洞、漏洞可远程利用、攻击风险高、用户应尽快更新Chrome,并采取安全措施。 可能的结构是:Google发布紧急安全更新修复Chrome的两个高危零日漏洞,这些漏洞可被远程利用,风险较高。建议用户立即更新浏览器并采取安全措施以防范攻击。 检查字数是否在限制内,并确保没有使用禁止的开头语句。这样应该能满足用户的需求。 </think> Google发布紧急安全更新修复Chrome的两个高危零日漏洞,这些漏洞可被远程利用,风险较高。建议用户立即更新浏览器并采取安全措施以防范攻击。 2026-3-13 12:58:37 Author: www.malwarebytes.com(查看原文) 阅读量:5 收藏

Google has released an out-of-band security update for Chrome desktop that patches two high‑severity zero‑day vulnerabilities.

Both bugs can be exploited remotely and require only that a user visit a malicious website. Because the attack complexity is low, the vulnerabilities pose a higher real-world risk.

How to update Chrome

The latest version numbers are 146.0.7680.75/76 for Windows and macOS and 146.0.7680.75 for Linux. If your Chrome browser is on version 146.0.7680.75 or later, you’re protected from these vulnerabilities.

The easiest way to stay up to date is to allow Chrome to update automatically. However, updates can lag if you rarely close your browser, or if something interferes with the update process.

To update manually:

  1. Click the More menu (three dots)
  2. Go to Settings > About Chrome.
  3. If an update is available, Chrome will start downloading it.
  4. Restart Chrome to complete the update, and you’ll be protected against these vulnerabilities.
Chrome on Windows up to date
Chrome (on Windows) is up to date

You can also find step-by-step instructions in our guide to how to update Chrome on every operating system, which includes instructions for checking your version number.

Technical details

Google reports that it discovered and fixed both bugs internally, with patches landing within roughly two days of reporting.

CVE‑2026‑3909 is an out‑of‑bounds write vulnerability in Skia, Chrome’s 2D graphics library used to render web content and UI elements. A remote attacker can lure a user to a malicious webpage that triggers the bug, corrupts memory, and potentially achieves code execution in the browser context. Skia is an open source 2D graphics library used not only in Google Chrome but also in many other products.

CVE‑2026‑3910 is an inappropriate implementation flaw in the V8 JavaScript and WebAssembly engine. A specially crafted HTML page could allow a remote attacker to execute arbitrary code inside the V8 sandbox. V8 is the engine that Google developed for processing JavaScript, and it has seen more than its fair share of bugs.

Chrome’s Skia and V8 components are prime targets because they sit directly on the path between untrusted web content and the underlying system.

It is possible to chain an out‑of‑bounds write in Skia with other bugs to break out of the renderer sandbox, while V8 implementation flaws frequently appear in exploit chains used by targeted threat actors and spyware vendors.

How to stay safe

To protect your device, update Chrome as soon as possible. Here are some more tips to avoid becoming a victim, even before a zero-day is patched:

  • Don’t click on unsolicited links in emails, messages, unknown websites, or on social media.
  • Enable automatic updates and restart regularly. Many users leave browsers open for days, which delays protection even if the update is downloaded in the background.
  • Use an up-to-date, real-time anti-malware solution which includes a web protection component.

Users of other Chromium-based browsers can expect to see a similar update soon.


We don’t just report on threats—we remove them

Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by downloading Malwarebytes today.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/03/google-patches-two-chrome-zero-days-under-active-attack-update-now
如有侵权请联系:admin#unsafe.sh