Description

Google has promptly addressed a critical security vulnerability in its Chrome browser, identified as CVE-2025-5419. This is the third actively exploited zero-day flaw discovered this year and originates from an out-of-bounds read and write issue within Chrome's V8 JavaScript engine. Google acted swiftly, deploying a configuration change to the Stable channel and releasing an official patch on June 3, 2025. Chrome users are currently receiving an emergency update, identified as versions 137.0.7151.68/.69 for Windows and Mac, and 137.0.7151.68 for Linux. Due to ongoing active exploitation, Google is withholding specific technical details of CVE-2025-5419 to allow more users to update their browsers and secure their systems. While Chrome typically updates automatically, users can manually expedite the process by accessing the Chrome menu, navigating to Help, then About Google Chrome, allowing the update to download, and finally clicking 'Relaunch' to apply the fix. This latest fix follows two other zero-day vulnerabilities patched by Google earlier in 2025. One, CVE-2025-2783, was a sandbox escape flaw leveraged in espionage campaigns against Russian entities. The second, addressed in May, facilitated account takeovers upon successful exploitation. In 2024, Google remediated a total of ten zero-day vulnerabilities, some of which were publicly demonstrated during the Pwn2Own hacking competition.