
[CIVN-2026-0029] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 144.0.7559.59/60 for Windows
Google Chrome versions prior to 144.0.7559.59/60 for Mac
Google Chrome versions prior to 144.0.7559.59 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code and bypass security restrictions on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
Potential for system compromise and service unavailability.
Impact Assessment:
High risk system compromise and service disruption.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.
Multiple vulnerabilities exist in Google Chrome due to Out of bounds memory access in V8; Inappropriate implementation in V8 and Blink; Insufficient validation of untrusted input in Downloads; Incorrect security UI in Digital Credentials; Insufficient policy enforcement in Network; Incorrect security UI in Split View; Use after free in ANGLE. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code and bypass security restrictions on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/01/stable-channel-update-for-desktop_13.html
CVE Name
CVE-2026-0899
CVE-2026-0900
CVE-2026-0901
CVE-2026-0902
CVE-2026-0903
CVE-2026-0904
CVE-2026-0905
CVE-2026-0906
CVE-2026-0907
CVE-2026-0908
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=XN1j
—–END PGP SIGNATURE—–


