📢 Gate Square #Creator Campaign Phase 2# is officially live!
Join the ZKWASM event series, share your insights, and win a share of 4,000 $ZKWASM!
As a pioneer in zk-based public chains, ZKWASM is now being prominently promoted on the Gate platform!
Three major campaigns are launching simultaneously: Launchpool subscription, CandyDrop airdrop, and Alpha exclusive trading — don’t miss out!
🎨 Campaign 1: Post on Gate Square and win content rewards
📅 Time: July 25, 22:00 – July 29, 22:00 (UTC+8)
📌 How to participate:
Post original content (at least 100 words) on Gate Square related to
Google Chrome Patches Zero-Day GPU Bug Exploited In The Wild
HomeNews* Google released patches for six security flaws in Chrome, including one critical zero-day vulnerability actively exploited.
The ANGLE (Almost Native Graphics Layer Engine) component acts as a bridge between Chrome’s rendering processes and a computer’s graphics drivers. This vulnerability allows attackers to use a specially crafted website to break out of the browser’s restricted environment. “An exploit for CVE-2025-6558 exists in the wild,” Google confirmed in an official post, suggesting possible targeting by advanced attackers.
The company resolved a similar zero-day, CVE-2025-6554, two weeks earlier, also reported by Lecigne. In total, Google has patched five Chrome zero-day bugs so far this year, including CVE-2025-2783, CVE-2025-4664, CVE-2025-5419, and CVE-2025-6554.
Google recommends that users update their browsers to versions 138.0.7204.157 or .158 for Windows and macOS, and 138.0.7204.157 for Linux. Users should go to More > Help > About Google Chrome and select Relaunch to ensure the latest updates are installed. The fixes also apply to other Chromium-based browsers, such as Microsoft Edge, Brave, Opera, and Vivaldi when updates become available.
Security experts caution that vulnerabilities in browser graphics components often reappear in targeted attacks. They advise users to remain vigilant for further browser updates and security patches.
Previous Articles: