[CIVN-2026-0170] Multiple Vulnerabilities in Google Chrome for Desktop

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google Chrome for Desktop


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Google Chrome versions prior to 146.0.7680.177 for Linux

Google Chrome versions prior to 146.0.7680.177/178 for Windows and Mac

Overview


Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, bypass security restrictions, or disclose sensitive information on the targeted system.


Target Audience:

All end-user organizations and individuals using Google Chrome for Desktop.


Risk Assessment:

High risk of remote code execution, memory corruption, and security bypass.


Impact Assessment:

Successful exploitation could lead to system compromise, data theft, or service disruption.


Description


Multiple vulnerabilities exist in Google Chrome due to Use-after-free in CSS, Web MIDI, WebCodecs, Dawn, WebGL, PDF, WebView, Navigation and Compositing; Heap buffer overflow in GPU and ANGLE; Integer overflow in ANGLE and Codecs; Out-of-bounds read in WebCodecs; Object corruption in V8; Inappropriate implementation in ANGLE and WebGL;  Insufficient policy enforcement in WebUSB. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, or disclose sensitive information on the targeted system.


Note: An exploit for CVE-2026-5281 (Use-after-free in Dawn) has been reported in the wild.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html



Vendor Information


Google Chrome

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html


References


 

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_31.html


CVE Name

CVE-2026-5272

CVE-2026-5273

CVE-2026-5274

CVE-2026-5275

CVE-2026-5276

CVE-2026-5277

CVE-2026-5278

CVE-2026-5279

CVE-2026-5280

CVE-2026-5281

CVE-2026-5282

CVE-2026-5283

CVE-2026-5284

CVE-2026-5285

CVE-2026-5286

CVE-2026-5287

CVE-2026-5288

CVE-2026-5289

CVE-2026-5290

CVE-2026-5291

CVE-2026-5292

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOiG4ACgkQ3jCgcSdc

ys8IDA/8D17Ub1HHyw/O5LDMXscmo/Q/q4A93Y69mcGewsr8OYThaeUoXhOyVlzm

h0PifFPm3k156VeUuBpdb2XjmMNj50y6wOmV/h2yDs/Z7l5c0gsYH3cVhSFPCIsS

Re22TtTWRuA1TdC6cE3Hm1R386oTir7Pv/7AvHYrQ8upud2324tjGVU1U415RwmU

vat+qKKPHGcMR3myiDkXFaM7y76bLbg+q7f/N/hzXDNoi1542GH337w2aDPx6AVO

ZRI/laXLND/HuINefhFijx2SY/TYZBhyflKBxixW43ZNLGOtMBKQmFtLuEwRzJMb

LiWp8KgJSdLjXH7xCnUlUYS4qpIMQQtt+Qixt7jcWuRCegTMQbrUkRr2jbnhHUmM

dtKbN8DRF4kYs6t7Yxo7IAaIZrLOP3CCd9ptTx5luzw+HVDV+BR8FbASNQY7J9Uj

p/qqb/MSxl+/WBHjDki2X8nwma8wvogsQLvul7cFVe1MhHaCxIJwUxvl+IpTA0ab

ltrn5dBs3P3HhdeTXmqavO7wdpt9+zPg9P6TPEFCHLQHHBQmQi6s3Y67pA9cVvpj

jiCQ81GhdLyZWFZdfdSeHNCh3jpUP5udWXjKVOlLmn0FRQ+Bs3d1LLh7yJJ366pq

PD5WK47VUl1wBp4Z6jaHIzkRJCvMuiUUQjIRdWCadgvpibD/RLk=

=TU21

—–END PGP SIGNATURE—–

Share this article