[CIVN-2026-0190] Multiple Vulnerabilities in Google Chrome for Desktop

By Published On: April 16, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google Chrome for Desktop


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Google Chrome versions prior to 147.0.7727.101 for Linux\

Google Chrome versions prior to 147.0.7727.101/102 for Windows and Mac

Overview


Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, bypass security restrictions, and obtain sensitive information on the targeted system.


Target Audience:

All end-user organizations and individuals using Google Chrome for Desktop.


Risk Assessment:

High risk of remote code execution, memory corruption, and security bypass.


Impact Assessment:

Successful exploitation could lead to system compromise or data theft.


Description


Google Chrome is a popular internet browser that is used for accessing the information available on the world wide web. It is designed for use on desktop computers, such as those running on windows, macOS, or Linux operating system.


Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in ANGLE, Skia, and PDFium; Use after free in Proxy, Prerender, XR, Video, CSS, Codecs, Graphite, Viz, FileSystem, Dawn, Permissions, Forms, Cast, and Payments; Type Confusion in Turbofan and V8; Out of bounds read in Media and Skia; Out of bounds write in GPU; Uninitialized Use in Accessibility; and Insufficient policy enforcement in Passwords and CORS. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, bypass security restrictions, and obtain sensitive information on the targeted system.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html



Vendor Information


Google Chrome

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html


References


Google Chrome

https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop_15.html


CVE Name

CVE-2026-6296

CVE-2026-6297

CVE-2026-6298

CVE-2026-6299

CVE-2026-6300

CVE-2026-6301

CVE-2026-6302

CVE-2026-6303

CVE-2026-6304

CVE-2026-6305

CVE-2026-6306

CVE-2026-6307

CVE-2026-6308

CVE-2026-6309

CVE-2026-6310

CVE-2026-6311

CVE-2026-6312

CVE-2026-6313

CVE-2026-6314

CVE-2026-6315

CVE-2026-6316

CVE-2026-6317

CVE-2026-6318

CVE-2026-6319

CVE-2026-6358

CVE-2026-6359

CVE-2026-6360

CVE-2026-6361

CVE-2026-6362

CVE-2026-6363

CVE-2026-6364




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmng/rcACgkQ3jCgcSdc

ys/d5xAAkH6Jo20FS14pS0MNd5H9OdCCn+T5lZY2VHiQSULEVQEpieBF5I5mlMl7

wh8qLBOIKHbQogcES7bwOaGmks5O/dAQ4KDsnQTWAuORbXBXC8KbD3yTWViClHzE

jpFjvjU7zgXdxKTySVMSjblxe38hhrlEY5CedAxVHAEbOMVgJbZv7I8r81+4dpg4

8uouALtkCvEFUin6LfMbk3awfd48PPCIvmz43MeCFOb9oq0vexapTQ+X20UZBChb

UfZM+/1zB71I15yWE1lNq/6DD7WqZaID/5sMHBx2/0z6VOYlea73Rrhbsx5Ussai

6KfY9UjoCLYJQbjzCpg0HfGeviwbsY3JfEftDu+yxA7zYcwsY//18Lda5EWNW/Xd

YsoeEaDNYJqfJfqNYpzayuPl+fh9tzf+32me96mvPXxIDATTbX5szkSKSHKzXFBf

g1gDlpCsmN5Gwudhh+LXEh/onQvTrRGRlAR3GFE0KogoejTFMlGG+1uyVowksgHS

fPMPb6EEYbqA2h6NQ3UjLOGbglKfkSRqH1uHLENM39rf6SGlQx9DYn0Zl7pwGpJv

P+GrIEw7ne+ViHuSjoCJ7m+rKKdfsoDJ32TNhD4jkCWpNi341jZlUUgLeYCyKaCX

Wqb6A1cHeAfJSWOdprx7Aa0UA5xzCzZilqE1bJRvqiRN8FhlUCA=

=4P2b

—–END PGP SIGNATURE—–

Share this article