{"id":343743,"date":"2025-07-31T01:55:00","date_gmt":"2025-07-31T08:55:00","guid":{"rendered":"https:\/\/cms-articles.softonic.io\/es\/?p=391664"},"modified":"2025-07-31T01:57:28","modified_gmt":"2025-07-31T08:57:28","slug":"google-chrome-receives-a-critical-update-without-which-you-could-lose-control-of-your-computer","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/google-chrome-receives-a-critical-update-without-which-you-could-lose-control-of-your-computer\/","title":{"rendered":"Google Chrome receives a critical update without which you could lose control of your computer"},"content":{"rendered":"\n<p>Google has released a critical update for its Chrome browser that fixes several severe vulnerabilities, including one that could allow attackers to manipulate memory and execute arbitrary code on users&#8217; systems. <strong>The latest version, Chrome 138.0.7204.183 for Linux and 138.0.7204.183\/.184 for Windows and Mac, addresses these urgent security issues and all users are advised to update their browser immediately<\/strong>.<\/p>\n\n\n<h2 class=\"wp-block-heading\">Update your browser right now<\/h2>\n\n\n<p>The most significant vulnerability in this update is CVE-2025-8292, a &#8216;use-after-free&#8217; type flaw found in the Media Stream component of Chrome.<strong> This type of memory corruption vulnerability is particularly dangerous, as a remote attacker can exploit it through a malicious HTML page<\/strong>. If successful, the attacker could crash the browser or execute malicious code, which could result in the installation of unauthorized programs, theft or alteration of data, or the creation of new user accounts with full privileges.<\/p>\n\n\n<p>The anonymous security researcher who discovered the vulnerability CVE-2025-8292 reported it to Google on June 19, 2025, and received a reward of $8,000 through the Chrome Vulnerability Reward Program. <strong>Google has restricted access to the full details of the bug to allow most users to apply the patch<\/strong>, a standard practice to prevent the active exploitation of vulnerabilities.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Google Chrome \u30a2\u30cb\u30e1 #3\u300c\u304c\u3093\u3070\u308c\uff01\u304f\u308d\u30fc\u3080  &quot;\u3086\u30fc\u3056\u30fc\u3055\u3093\u305c\u3063\u305f\u3044\u307e\u3082\u308b\uff01\u306e\u5dfb&quot;\u300d\" width=\"840\" height=\"473\" src=\"https:\/\/www.youtube.com\/embed\/nMF3nLV-m24?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n<p>This update is part of a series of security patches for Chrome 138. Previously, in July, Google addressed other serious vulnerabilities, including CVE-2025-6558, a zero-day exploit that was actively being used in attacks. <strong>Throughout June and July, Chrome 138 has received multiple updates to fix various security flaws, including type confusion in the V8 JavaScript engine and other memory-related errors<\/strong>.<\/p>\n\n\n<p>Google&#8217;s security teams are constantly working to discover and resolve vulnerabilities through internal audits and other security initiatives.<strong> Users can ensure that their browser is up to date by going to &#8220;Help&#8221; and then &#8220;About Google Chrome&#8221; in the browser menu.<\/strong><\/p>\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" alt=\"Google Chrome\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-icon-s\/p\/f875d630-96d4-11e6-b152-00163ed833e7\/2845731368\/chrome-logo\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Google Chrome<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/chrome.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DOWNLOAD<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--0\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"0\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\"><\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/chrome.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Google has released a critical update for its Chrome browser that fixes several severe vulnerabilities, including one that could allow attackers to manipulate memory and execute arbitrary code on users&#8217; systems. The latest version, Chrome 138.0.7204.183 for Linux and 138.0.7204.183\/.184 for Windows and Mac, addresses these urgent security issues and all users are advised to update their browser immediately. Update your browser right now The most significant vulnerability in this update is CVE-2025-8292, a &#8216;use-after-free&#8217; type flaw found in Chrome&#8217;s Media Stream component. This type of vulnerability of [&#8230;]<\/p>\n","protected":false},"author":9318,"featured_media":343744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[1015,11143],"tags":[1045,1081,14455,4552,13665],"usertag":[],"vertical":[],"content-category":[7176],"class_list":["post-343743","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-softwaresecurity","tag-google-chrome","tag-mac","tag-media-stream","tag-parche","tag-vulnerabilidad","content-category-seguridad-privacidad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/343743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/9318"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=343743"}],"version-history":[{"count":2,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/343743\/revisions"}],"predecessor-version":[{"id":343756,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/343743\/revisions\/343756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media\/343744"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=343743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=343743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=343743"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=343743"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=343743"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=343743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}