[CIVN-2026-0167] Multiple Vulnerabilities in Google Chrome for Desktop

By Published On: April 2, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google Chrome for Desktop


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Google Chrome versions prior to 146.0.7680.164/165 for Windows/Mac

Google Chrome versions prior to 146.0.7680.164 for Linux

Overview


Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, obtain sensitive information and cause denial of sevice(DoS) condition on the targeted system.


Target Audience:

All end-user organizations and individuals using Google Chrome for Desktop.


Risk Assessment:

High risk of arbitrary code execution or system compromise.


Impact Assessment:

Potential for sensitive information disclosure, service disruption.


Description


Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.


Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in WebAudio and WebGL; Out of bounds read in CSS and WebAudio; Use after free in Dawn, WebGPU and FedCM; Integer overflow in Fonts. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information and cause denial of sevice(DoS) condition on the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html



Vendor Information


Google Chrome

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html


References


Google Chrome

https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html


CVE Name

CVE-2026-4673

CVE-2026-4674

CVE-2026-4675

CVE-2026-4676

CVE-2026-4677

CVE-2026-4678

CVE-2026-4679

CVE-2026-4680




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnOhkIACgkQ3jCgcSdc

ys99eRAAjSYCsd+7f3SIzChA08bu5I9wPV2Vnr294xyP7jXCYB3vc+oUUquyCTe0

2k61I/rUX1UjkdtgEq1ZIHzr5hd7ca4foCt3/kaLABS5DxyQNg++S00pKX934SWy

WfJhIoiFWzXNTtEADP610kUScEAPGVLwfxpjCDL7XNiWqH9jh9KXmd+Bo69RwJwK

2XTL4AOW7TKidkfwOEsLX0OFRfIKdrgtFGxhec2e8y2wfqtUAfUMUpsGESaRvFy9

nfR7yV6l2Q96txy49ehTvNEf6tKrlrA199FTJHSmDUvXFKplULQIJ9SGLQzbiw2m

qWMUDGpykcZsqE22NQfd6L3lhj6cQ0EPw4wdNj5F3+nXhkEpDyqDzSCbvYcAGRIm

lsyLRRa6SDrnYpRymQs00KwRjpTNFVqODZLIa22k3TQKiL3SejM1kzcQf0eDS0Y9

vV2NvRb6uWPflmeHkXBnK0sYXNQ1qotr6NxmdYxTQSTI2hFZcC+5ZlFFMXXUebPe

TiPdWk8D9xrWFCb4vM/uZk6HjcZ9Y55+dmiBZZX7qkftgnkSO3W6bo+ZU4TVBcVy

GqW/d+Fwd2O4XXJWqaEwoh/q8/LfqhafDMcVH3eH2tFq9DlNlaBA2T9xuuGCzh7I

TpZPta0hTG/ZwBcXeQMw0vFNPtMoHPdgAEVaqsqTgsSZ+d5hRSk=

=EOeD

—–END PGP SIGNATURE—–

Share this article