
[CIVN-2026-0183] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 147.0.7727.55/56 for Windows/Mac
Google Chrome versions prior to 147.0.7727.55 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, bypass security restrictions, obtain sensitive information and cause denial of service (DoS) condition on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
High risk of remote code execution, memory corruption, and security bypass.
Impact Assessment:
Successful exploitation could lead to system compromise, data theft, or service disruption.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.
Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in WebML, WebAudio and ANGLE; Integer overflow in WebML, Skia, Media and WebRTC; Use after free in WebRTC, V8, Media, Blink, PrivateAI and Navigation; Type Confusion in V8 and CSS; Inappropriate implementation in V8, PDF and Navigation; Out of bounds read and write in V8, and Out of bounds read in WebAudio and Blink; Policy bypass in Blink, LocalNetworkAccess, Audio, Downloads, DevTools, IFrameSandbox and ServiceWorkers; Side-channel information leakage in Navigation; Incorrect security UI in Blink, browser UI, Fullscreen, Omnibox, Downloads, History Navigation and Permissions; Insufficient validation of untrusted input in ANGLE, Media, WebML, Downloads and WebSockets; Insufficient policy enforcement in browser UI and PWAs; Race condition in WebCodecs, V8 and Media; Uninitialized use in WebCodecs; Cryptographic flaw in PDFium; and Insufficient data validation in Media. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, obtain sensitive information and cause denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html
CVE Name
CVE-2026-5858
CVE-2026-5859
CVE-2026-5860
CVE-2026-5861
CVE-2026-5862
CVE-2026-5863
CVE-2026-5864
CVE-2026-5865
CVE-2026-5866
CVE-2026-5867
CVE-2026-5868
CVE-2026-5869
CVE-2026-5870
CVE-2026-5871
CVE-2026-5872
CVE-2026-5873
CVE-2026-5874
CVE-2026-5875
CVE-2026-5876
CVE-2026-5877
CVE-2026-5878
CVE-2026-5879
CVE-2026-5880
CVE-2026-5881
CVE-2026-5882
CVE-2026-5883
CVE-2026-5884
CVE-2026-5885
CVE-2026-5886
CVE-2026-5887
CVE-2026-5888
CVE-2026-5889
CVE-2026-5890
CVE-2026-5891
CVE-2026-5892
CVE-2026-5893
CVE-2026-5894
CVE-2026-5895
CVE-2026-5896
CVE-2026-5897
CVE-2026-5898
CVE-2026-5899
CVE-2026-5900
CVE-2026-5901
CVE-2026-5902
CVE-2026-5903
CVE-2026-5904
CVE-2026-5905
CVE-2026-5906
CVE-2026-5907
CVE-2026-5908
CVE-2026-5909
CVE-2026-5910
CVE-2026-5911
CVE-2026-5912
CVE-2026-5913
CVE-2026-5914
CVE-2026-5915
CVE-2026-5918
CVE-2026-5919
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=p+/N
—–END PGP SIGNATURE—–


