
[CIVN-2026-0167] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Google Chrome versions prior to 146.0.7680.164/165 for Windows/Mac
Google Chrome versions prior to 146.0.7680.164 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, obtain sensitive information and cause denial of sevice(DoS) condition on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
High risk of arbitrary code execution or system compromise.
Impact Assessment:
Potential for sensitive information disclosure, service disruption.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.
Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in WebAudio and WebGL; Out of bounds read in CSS and WebAudio; Use after free in Dawn, WebGPU and FedCM; Integer overflow in Fonts. A remote attacker could exploit these vulnerabilities by persuading a victim to visit a specially crafted web page.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information and cause denial of sevice(DoS) condition on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_23.html
CVE Name
CVE-2026-4673
CVE-2026-4674
CVE-2026-4675
CVE-2026-4676
CVE-2026-4677
CVE-2026-4678
CVE-2026-4679
CVE-2026-4680
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=EOeD
—–END PGP SIGNATURE—–


