
[CIVN-2026-0190] Multiple Vulnerabilities in Google Chrome for Desktop
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Google Chrome for Desktop
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Google Chrome versions prior to 147.0.7727.101 for Linux\
Google Chrome versions prior to 147.0.7727.101/102 for Windows and Mac
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, bypass security restrictions, and obtain sensitive information on the targeted system.
Target Audience:
All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment:
High risk of remote code execution, memory corruption, and security bypass.
Impact Assessment:
Successful exploitation could lead to system compromise or data theft.
Description
Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.
Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in ANGLE, Skia, and PDFium; Use after free in Proxy, Prerender, XR, Video, CSS, Codecs, Graphite, Viz, FileSystem, Dawn, Permissions, Forms, Cast, and Payments; Type Confusion in Turbofan and V8; Out of bounds read in Media and Skia; Out of bounds write in GPU; Uninitialized Use in Accessibility; and Insufficient policy enforcement in Passwords and CORS. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, and obtain sensitive information on the targeted system.
Solution
Apply appropriate updates as mentioned as mentioned by the Vendor:
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html
Vendor Information
Google Chrome
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html
References
Google Chrome
https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html
CVE Name
CVE-2026-6296
CVE-2026-6297
CVE-2026-6298
CVE-2026-6299
CVE-2026-6300
CVE-2026-6301
CVE-2026-6302
CVE-2026-6303
CVE-2026-6304
CVE-2026-6305
CVE-2026-6306
CVE-2026-6307
CVE-2026-6308
CVE-2026-6309
CVE-2026-6310
CVE-2026-6311
CVE-2026-6312
CVE-2026-6313
CVE-2026-6314
CVE-2026-6315
CVE-2026-6316
CVE-2026-6317
CVE-2026-6318
CVE-2026-6319
CVE-2026-6358
CVE-2026-6359
CVE-2026-6360
CVE-2026-6361
CVE-2026-6362
CVE-2026-6363
CVE-2026-6364
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmng/rcACgkQ3jCgcSdc
ys/d5xAAkH6Jo20FS14pS0MNd5H9OdCCn+T5lZY2VHiQSULEVQEpieBF5I5mlMl7
wh8qLBOIKHbQogcES7bwOaGmks5O/dAQ4KDsnQTWAuORbXBXC8KbD3yTWViClHzE
jpFjvjU7zgXdxKTySVMSjblxe38hhrlEY5CedAxVHAEbOMVgJbZv7I8r81+4dpg4
8uouALtkCvEFUin6LfMbk3awfd48PPCIvmz43MeCFOb9oq0vexapTQ+X20UZBChb
UfZM+/1zB71I15yWE1lNq/6DD7WqZaID/5sMHBx2/0z6VOYlea73Rrhbsx5Ussai
6KfY9UjoCLYJQbjzCpg0HfGeviwbsY3JfEftDu+yxA7zYcwsY//18Lda5EWNW/Xd
YsoeEaDNYJqfJfqNYpzayuPl+fh9tzf+32me96mvPXxIDATTbX5szkSKSHKzXFBf
g1gDlpCsmN5Gwudhh+LXEh/onQvTrRGRlAR3GFE0KogoejTFMlGG+1uyVowksgHS
fPMPb6EEYbqA2h6NQ3UjLOGbglKfkSRqH1uHLENM39rf6SGlQx9DYn0Zl7pwGpJv
P+GrIEw7ne+ViHuSjoCJ7m+rKKdfsoDJ32TNhD4jkCWpNi341jZlUUgLeYCyKaCX
Wqb6A1cHeAfJSWOdprx7Aa0UA5xzCzZilqE1bJRvqiRN8FhlUCA=
=4P2b
—–END PGP SIGNATURE—–


