[CIVN-2026-0235] Multiple Vulnerabilities in Google Chrome for Desktop

By Published On: May 14, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Google Chrome for Desktop


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


Google Chrome versions prior to 148.0.7778.96 for Linux

Google Chrome versions prior to 148.0.7778.96/97 for Windows and Mac

Overview


Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions or cause denial of service (DoS) conditions on the targeted system.


Target Audience:

All end-user organizations and individuals using Google Chrome for Desktop.


Risk Assessment:

High risk of remote code execution, privilege escalation or unauthorized access to sensitive data.


Impact Assessment:

Potential for system compromise, data theft or service disruption.


Description


Google Chrome is a popular internet browser used for accessing information on the World Wide Web. It is designed for use on desktop systems including Windows, macOS and Linux.


Multiple vulnerabilities exist in Google Chrome due to Integer overflow in Blink, ANGLE, Network, Dawn and GPU; Use after free in ANGLE, Audio, Aura, Blink, CSS, DevTools, GPU, MediaRecording, Navigation, Passwords, PresentationAPI, Printing, ReadingMode, ServiceWorker, Skia, SVG, TopChrome, UI, V8, Views, WebAudio, WebRTC, Mobile, Chromoting, Fullscreen, and DOM; Inappropriate implementation in ServiceWorker, Canvas, Cast, Chromoting, Companion, Media, MHTML, Navigation, ORB, Preload, SanitizerAPI, ServiceWorker, Speech, V8 and DevTools; Insufficient data validation in DataTransfer, DevTools and InterestGroups,  Insufficient policy enforcement in Autofill, DevTools, DirectSockets, Downloads, Extensions, Search, WebApp and WebUI;  Insufficient validation of untrusted input in ANGLE, Cast, ChromeDriver, Cookies, COOP, CORS, DevTools, Dialog, FedCM, FileSystem, iOS, Media, Mobile, Navigation, Network, Omnibox, Payments, Permissions, Persistent Cache, Popup Blocker, SiteIsolation, SSL, TabGroups, UI and Updater,  Object lifecycle issue in V8;  Out of bounds memory access in V8,   read in AdFilter, Codecs, Dawn, Fonts, Skia and WebCodecs,  read and write in GFX and V8, write in Media, Skia and WebRTC, Race in Chromoting, Shared Storage and Speech,  Script injection in UI, Side-channel information leakage in Media; Type Confusion in Accessibility, Runtime and WebRTC, Uninitialized Use in Dawn, GPU and WebCodecs.  A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.


Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions or cause denial of service (DoS) conditions on the targeted system.


Solution


Apply appropriate as mentioned by the vendor:

https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html



Vendor Information


 

https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html


References


 

https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop.html


CVE Name

CVE-2026-7896

CVE-2026-7898

CVE-2026-7897

CVE-2026-7900

CVE-2026-7909

CVE-2026-7915

CVE-2026-7916

CVE-2026-7913

CVE-2026-7905

CVE-2026-7903

CVE-2026-7912

CVE-2026-7902

CVE-2026-7899

CVE-2026-7904

CVE-2026-7923

CVE-2026-7914

CVE-2026-7927

CVE-2026-7924

CVE-2026-7901

CVE-2026-7911

CVE-2026-7919

CVE-2026-7925

CVE-2026-7907

CVE-2026-7908

CVE-2026-7917

CVE-2026-7918

CVE-2026-7929

CVE-2026-7921

CVE-2026-7926

CVE-2026-7922

CVE-2026-7920

CVE-2026-7906

CVE-2026-7910

CVE-2026-7928


 




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmoF528ACgkQ3jCgcSdc

ys/rtg/+IjmCHMd3zU4sC47aHQ3gbN5p1IagxMXcZR+MVf2hheF1uQTNDBVa/Nr/

tcBt3xZXMaXr16LSgV/JAtPOb2UKm1xDlfFRFRJ8eSPWxnwX+8ajkISvlhh5jd3O

vC7Q5QbpW9M6QDYu9jX+UZxcsr0F7Iovl6Dw6XfLhnX9FaboYUo28Jm3NYMSAUMp

XjipRmQO/GoDukBw46dSk8mXs6/SrBmhZpMDE7lNao24MVun4jQ77Nex/6InuBjc

P5x5rW4d7qcUW9FN3R/mOqQD2EAksAH/m5OmTXtGclyCnDLdCD4mlgqWDReYbYh1

F1XSh+mNLoQgnU493+PgCyA+9K7ZzsJbj2R9Z/UpsxC0kpIpW4KsXw9GW+9VrRkE

2DIYHHyS6hE5vLpU67y+jxRMOIBAm4YJ2hlkC76oI3NcYXwTUFuLyPwS88ycJ/QR

VK0pPmcxrrG6XYVU6Hf/jCrrwaPA5pjg3AUEq16XXqa+ac+/lBYv9kmns+9cdOvy

4+B8hTpT38L+0t2UNn2ETGpP8LuNr8UNeZw8lgmguglZZsFPZniqhnRVLuB7PRCz

xHuSiaxwYb5CjdcNBZhomHx+duMLAqfpb0JD0w/ReMwudHAAmJiQHFro6IYoJB85

V02dLbu0j5RMgU6X+sTmh072SMj0tl+HBO3L7fQ/oHCOhjE0daA=

=xPhB

—–END PGP SIGNATURE—–

Share this article