Chrome Fix: New Use-After-Free Flaw (CVE-2025-11756) in Safe Browsing Component Poses High Risk

Chrome Fix: New Use-After-Free Flaw (CVE-2025-11756) in Safe Browsing Component Poses High Risk

Google has released a new Stable Channel Update for Desktop, rolling out gradually to Windows, macOS, and Linux systems over the coming days and weeks. The update brings Chrome to version 141.0.7390.107/.108 for Windows and Mac, and 141.0.7390.107 for Linux, addressing one high-severity that could allow attackers to exploit Chrome’s Safe Browsing component.

The fixed (CVE-2025-11756) is a use after free in Safe Browsing. Although Google has not confirmed active exploitation, the severity rating of High and the nature of the make it a potential target for attackers, particularly in phishing or drive-by download campaigns.

The flaw, categorized as a “use-after-free” , resides in Chrome’s Safe Browsing component — the subsystem responsible for detecting and blocking access to malicious websites and files.
“Use-after-free” occur when a program continues to use memory after it has been released or freed, potentially allowing attackers to execute arbitrary code or trigger a crash.

While Google has not provided exploit details, use-after-free are commonly exploited in the wild to achieve remote code execution (RCE) or sandbox escape, making this update a high priority for users and enterprises alike.

Google recommends that users manually trigger the update by navigating to Settings → Help → About Google Chrome, allowing the browser to automatically check for and install the latest version.

Previous Article

October Patch Tuesday: Microsoft Fixes 6 Zero-Days, Including 4 Actively Exploited Flaws, as Windows 10 Reaches End-of-Life

Next Article

Critical RCE Flaws CVE-2025-48983 & CVE-2025-48984 (CVSS 9.9) Found in Veeam Backup & Replication