Google released Chrome version 148 on Friday to patch 79 security vulnerabilities, including 14 classified as critical [1, 2, 3].

This update is essential because critical-severity flaws can allow attackers to execute malicious code or compromise user data. Because Chrome is one of the most widely used browsers globally, these vulnerabilities represent a significant surface area for potential cyberattacks across multiple operating systems.

The security update applies to Chrome users on Windows, macOS, and Linux [3]. Specifically, the company released build 148..7778.167/168 for Windows and macOS, and build 148..7778.167 for Linux [3]. These patches are designed to close the 79 newly identified gaps in the browser's security architecture [1].

Of the total vulnerabilities identified, 14 are categorized as critical [1]. These high-severity flaws often pose the greatest risk to users, potentially enabling remote code execution or unauthorized system access if left unpatched.

Google issued the update to protect users from exploitation and to address the newly discovered flaws [1, 2]. The company typically pushes these updates automatically, but users may need to restart their browsers to complete the installation process.

This latest batch of fixes follows a pattern of frequent security iterations. While some reports from earlier this month mentioned a different volume of vulnerabilities, the current release specifically targets these 79 flaws [1].

Google released Chrome version 148 on Friday to patch 79 security vulnerabilities

The release of Chrome 148 highlights the ongoing arms race between browser developers and security researchers or bad actors. By patching 14 critical vulnerabilities simultaneously, Google is mitigating risks that could have led to widespread data breaches or system compromises. For the average user, this underscores the necessity of maintaining automatic updates to defend against 'zero-day' style exploits that target known software weaknesses.