
[CIVN-2026-0235] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
Google Chrome versions prior to 148.0.7778.96 for Linux
Google Chrome versions prior to 148.0.7778.96/97 for Windows and Mac
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions or cause denial of service (DoS) conditions on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
High risk of remote code execution, privilege escalation or unauthorized access to sensitive data.
Impact Assessment:
Potential for system compromise, data theft or service disruption.
Description
Google Chrome is a popular internet browser used for accessing information on the World Wide Web. It is designed for use on desktop systems including Windows, macOS and Linux.
Multiple vulnerabilities exist in Google Chrome due to Integer overflow in Blink, ANGLE, Network, Dawn and GPU; Use after free in ANGLE, Audio, Aura, Blink, CSS, DevTools, GPU, MediaRecording, Navigation, Passwords, PresentationAPI, Printing, ReadingMode, ServiceWorker, Skia, SVG, TopChrome, UI, V8, Views, WebAudio, WebRTC, Mobile, Chromoting, Fullscreen, and DOM; Inappropriate implementation in ServiceWorker, Canvas, Cast, Chromoting, Companion, Media, MHTML, Navigation, ORB, Preload, SanitizerAPI, ServiceWorker, Speech, V8 and DevTools; Insufficient data validation in DataTransfer, DevTools and InterestGroups, Insufficient policy enforcement in Autofill, DevTools, DirectSockets, Downloads, Extensions, Search, WebApp and WebUI; Insufficient validation of untrusted input in ANGLE, Cast, ChromeDriver, Cookies, COOP, CORS, DevTools, Dialog, FedCM, FileSystem, iOS, Media, Mobile, Navigation, Network, Omnibox, Payments, Permissions, Persistent Cache, Popup Blocker, SiteIsolation, SSL, TabGroups, UI and Updater, Object lifecycle issue in V8; Out of bounds memory access in V8, read in AdFilter, Codecs, Dawn, Fonts, Skia and WebCodecs, read and write in GFX and V8, write in Media, Skia and WebRTC, Race in Chromoting, Shared Storage and Speech, Script injection in UI, Side-channel information leakage in Media; Type Confusion in Accessibility, Runtime and WebRTC, Uninitialized Use in Dawn, GPU and WebCodecs. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions or cause denial of service (DoS) conditions on the targeted system.
Solution
Apply appropriate as mentioned by the vendor:
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html
Vendor Information
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html
References
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html
CVE Name
CVE-2026-7896
CVE-2026-7898
CVE-2026-7897
CVE-2026-7900
CVE-2026-7909
CVE-2026-7915
CVE-2026-7916
CVE-2026-7913
CVE-2026-7905
CVE-2026-7903
CVE-2026-7912
CVE-2026-7902
CVE-2026-7899
CVE-2026-7904
CVE-2026-7923
CVE-2026-7914
CVE-2026-7927
CVE-2026-7924
CVE-2026-7901
CVE-2026-7911
CVE-2026-7919
CVE-2026-7925
CVE-2026-7907
CVE-2026-7908
CVE-2026-7917
CVE-2026-7918
CVE-2026-7929
CVE-2026-7921
CVE-2026-7926
CVE-2026-7922
CVE-2026-7920
CVE-2026-7906
CVE-2026-7910
CVE-2026-7928
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=xPhB
—–END PGP SIGNATURE—–


