Skip to content
Google Chrome Releases

Chrome 143.0.7499.109/.110 update: the CVEs and what I’d do next

Chrome 143.0.7499.109/.110 update: the CVEs and what I’d do next Browser patches break things. They also stop real attacks, and this one includes a High-severity fix with an exploit in the wild. Google posted a Stable channel update on December 10, 2025. It moves Windows and macOS to 143.0.7499.109/.110, and Linux to 143.0.7499.109, and Google […]

Jack Pauley December 16, 2025 6 min read

Chrome 143.0.7499.109/.110 update: the CVEs and what I’d do next

Browser patches break things. They also stop real attacks, and this one includes a High-severity fix with an exploit in the wild.

Google posted a Stable channel update on December 10, 2025. It moves Windows and macOS to 143.0.7499.109/.110, and Linux to 143.0.7499.109, and Google says the rollout will happen over the coming days and weeks.

What actually changed (not the marketing version)

I’ve watched teams approve “security and stability” updates without reading the CVE list, then scramble when an extension or SSO flow acts weird. So I start with the concrete bits from the release post, then I decide how fast to push.

  • Windows and macOS: Update to 143.0.7499.109/.110.
  • Linux: Update to 143.0.7499.109.
  • Security fixes: The release post lists three fixes total, one High and two Medium.

The security fixes (CVE list you can forward to IT)

Ignore the GitHub commit count. It’s a vanity metric. I care about exploitability, and Google explicitly says one of these has an exploit in the wild.

  • CVE-2025-14174 (High): Out of bounds memory access in ANGLE. Google says an exploit exists in the wild.
  • CVE-2025-14372 (Medium): Use after free in Password Manager.
  • CVE-2025-14373 (Medium): Inappropriate implementation in Toolbar.

If you only read one line: CVE-2025-14174 has an exploit in the wild. That usually means “move sooner than your normal browser patch window.”

Who should upgrade, and how paranoid to be

Depends on how you run Chrome. Home users can just update and relaunch. Enterprises should stage it unless the exploit note changes your risk tolerance.

  • Home users: Update as soon as Chrome offers it, then relaunch the browser so the new build actually loads.
  • Enterprise fleets: Pilot on a small group first, then roll out in waves. Some folks skip canaries for browser patches. I don’t, but I get it.
  • High-risk users (admins, finance, anyone handling sensitive data): Treat this as urgent because of the in-the-wild exploit note.

How to upgrade and verify the exact build

This bit has bitten people. Chrome downloads the update, then sits there until a relaunch, and your “I updated” screenshot still shows the old version.

  • Check and update: Open chrome://settings/help and let Chrome download the update.
  • Finish the job: Relaunch Chrome when prompted, then re-check the version.
  • Verify: Confirm you’re on 143.0.7499.109 or 143.0.7499.110 (Windows/macOS), or 143.0.7499.109 (Linux).
  • Enterprise rollouts: Use Chrome Browser Cloud Management or your existing policies to stage and then expand the deployment.

Known issues (what the post says, and what it does not)

The Chrome Releases post does not list known issues for this update. I do not trust “known issues: none” from any project, so keep an eye on extension breakage and weird auth prompts after the relaunch.

Other stuff in this release: the usual.

Official reference

Read the original release post, including the CVE list and rollout note: Chrome Releases blog.

Official Resources

For the full details on the vulnerabilities fixed in this release, consult these official sources:


Related Reading

Verify Chrome version from the command line

The GUI check at chrome://settings/help works for one machine. If you manage a fleet, you need something scriptable. Here is how to pull the version on each platform:

# macOS
/Applications/Google\ Chrome.app/Contents/MacOS/Google\ Chrome --version
# Expected output: Google Chrome 143.0.7499.110

# Linux
google-chrome --version
# Expected output: Google Chrome 143.0.7499.109

# Windows (PowerShell)
(Get-Item "C:\Program Files\Google\Chrome\Application\chrome.exe").VersionInfo.FileVersion
# Expected output: 143.0.7499.110

Pipe this into your inventory tool or CMDB. If the version is lower than 143.0.7499.109, the machine is still vulnerable to CVE-2025-14174.

Enforce the update with Chrome enterprise policies

If you manage Chrome via Google Admin Console or group policy, you can force the update window tighter than the default “rollout over coming days and weeks.” Here is a JSON policy snippet for managed Chrome:

{
  "RelaunchNotification": 2,
  "RelaunchNotificationPeriod": 3600000,
  "RelaunchWindow": {
    "entries": [
      {
        "start": { "hour": 2, "minute": 0 },
        "duration_mins": 120
      }
    ]
  },
  "TargetVersionPrefix": "143.0.7499."
}

RelaunchNotification: 2 means “required relaunch.” The RelaunchNotificationPeriod gives users one hour (3,600,000 ms) before Chrome force-restarts. The RelaunchWindow limits that forced restart to 02:00-04:00 so you don’t interrupt meetings. Adjust the window to match your maintenance schedule.

Quick audit script for fleet compliance

For teams running SSH access to Linux machines or using a tool like Ansible, here is a one-liner to check which hosts are still on the old version:

# Check all hosts in your inventory
ansible all -m shell -a "google-chrome --version 2>/dev/null || echo 'Chrome not installed'"   | grep -v "143.0.7499.109\|143.0.7499.110\|Chrome not installed"
# Any output = hosts still on a vulnerable version

If you are not using Ansible, a simple SSH loop works:

for host in $(cat hosts.txt); do
  echo -n "$host: "
  ssh "$host" "google-chrome --version 2>/dev/null || echo 'N/A'"
done | grep -v "143.0.7499"

Run this daily until your fleet reaches full coverage. The in-the-wild exploit on CVE-2025-14174 means you want zero stragglers.

Monitor your Chrome versions with ReleaseRun

Instead of manually checking Chrome releases, you can track the current version and health status on our Chrome release tracker. We also provide embeddable Chrome health badges for your internal dashboards, and you can scan your security posture with our free security header analyzer.

🛠️ Try These Free Tools

🗺️ Upgrade Path Planner

Plan your upgrade path with breaking change warnings and step-by-step guidance.

💰 Kubernetes Cost Estimator

Compare EKS, GKE, and AKS monthly costs side by side.

🛡️ Security Header Analyzer

Analyse HTTP security headers for best-practice compliance.

See all free tools →

Stay Updated

Get the best releases delivered monthly. No spam, unsubscribe anytime.

By subscribing you agree to our Privacy Policy.