
[CIVN-2026-0096] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 145.0.7632.109/110 for Windows
Google Chrome versions prior to 145.0.7632.109/110 for Mac
Google Chrome versions prior to 144.0.7559.109 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome for Desktop, which could be exploited by a remote attacker to execute arbitrary code, cause memory corruption or trigger a denial of service (DoS) condition on the targeted system.
Target Audience:
All end-users, organizations, and individuals using Google Chrome for Desktop (Windows, macOS, and Linux platforms)
Risk Assessment:
High risk of remote code execution (RCE)
Impact Assessment:
Potential for memory corruption and denial of service (DoS)
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the World Wide Web.It is designed for use on Desktop computers, such as those running on Windows, macOS, or Linux operating systems.
Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflows in PDFium and Media; Integer overflow in V8. A remote attacker could exploit these vulnerabilities by convincing a user to visit a specially crafted or malicious web page on the targeted system.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, cause memory corruption or trigger a denial of service (DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_18.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_18.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_18.html
CVE Name
CVE-2026-2648
CVE-2026-2649
CVE-2026-2650
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmYexoACgkQ3jCgcSdc
ys9emg/8CGCwRVPIDvJkS1ipzOgyC/hKM30StG99L8inCoKMCTuvtsj5B2yciWwC
haCZBdq2nU2Hr+39NDrDtXq3hylFthGFgV/LXpLyCASEd5Ei1ZBHr5VrOo/PKDKo
cormMMoUIl4W0nnNLbQLSMzEKMGAmc8LE9z3C6knqMfBTb+ldQjkABZS+l8EINy1
CYC9YvTegYXFGT2diNd1LAI1Lx+ZTT3O3KqopGh8Yb1rjBGMKezx2iLNYW0nkwOn
Dnyul9TlR9KcG2DkpPr0bHMM9kc5ZWL5vybK2pCupuLcYuTnoU5h3xAulvLKSasC
OswCttoVVRzZuf4QzuVxDVzImBHmqAKg9thUbNlg26jKp4E0/qjsafjABLd306tA
2lzXz1wAkoz7vCLlWN7tJ6K2RntaJLGqNntqo0NLWkVZXl/Pjqw5Fl49zJEdXDBh
JeelmKT04gwilGx1qgguPY/vwpreV3XoEjEOw06hRs0w0YdDeteBX8Fw81MZAmgg
+cDJHkdNYgvaIHxIr2jWKYODIxNnVzzqeiXnOHLrg2iKnRH2E44Kg5nxu9sC6FSF
4+DJZQZWQGEjpGfqyC/HVrcUiJD52Kwr54xRsUKyomPaJnSl79jnGQF8VY1l4MPz
CVGVvPJppD6VdQLzTCdPJLMAEDaoenHvl8AOmk6FJ16TWqUnCgw=
=nppT
—–END PGP SIGNATURE—–


