CERT-In Vulnerability Note
CIVN-2026-0248
Multiple Vulnerabilities in Google Chrome for Desktop
Original Issue Date:May 20, 2026
Severity Rating: HIGH
Software Affected
- Google Chrome versions prior to 148.0.7778.167/168 for Windows and Mac
- Google Chrome versions prior to 148.0.7778.167 for Linux
Overview
Multiple vulnerabilities have been reported in Google Chrome which could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions, perform spoofing attack or cause denial of service (DoS) conditions on the targeted system.
Target Audience: All end-user organizations and individuals using Google Chrome for Desktop.
Risk Assessment: High risk of remote code execution, privilege escalation or unauthorized access to sensitive data.
Impact Assessment: Potential for system compromise, data theft or service disruption.
Description
Google Chrome is a popular internet browser used for accessing information on the World Wide Web. It is designed for use on desktop systems including Windows, macOS and Linux.
Multiple vulnerabilities exist in Google Chrome due to Heap buffer overflow in WebML, ANGLE, Codecs, GPU, SwiftShader; Integer overflow in Skia, ANGLE, XML, GPU, Internationalization, Codecs, Fonts; Use after free in UI, FileSystem, Input, Aura, HID, Blink, Tab Groups, Downloads, Mojo, Network, Accessibility, Core, Media, Google Lens, GPU, GTK, Extensions; Insufficient validation of untrusted input in DataTransfer, Downloads, SiteIsolation, ReadingMode, Skia, GPU; Insufficient policy enforcement in ViewTransitions, Passwords, IFrame Sandbox, Payments, AI, GPU, Network, WebXR; Object lifecycle issue in WebShare, Dawn; Object corruption in Compositing; Race in Payments; Out of bounds write in Fonts, WebAudio, WebRTC, Media, Codecs; Out of bounds read in Media, UI, FileSystem, GPU; Script injection in SanitizerAPI; Type Confusion in V8, ANGLE; Inappropriate implementation in ANGLE, CORS, Views, Media, Chromoting, Downloads; Incorrect security UI in Fullscreen, Downloads; Side-channel information leakage in Navigation. A remote attacker could exploit these vulnerabilities by convincing a victim to open a specially crafted web request.
Successful exploitation of these vulnerabilities could allow a remote attacker to execute arbitrary code, obtain sensitive information, bypass security restrictions or cause denial of service (DoS) conditions on the targeted system.
Solution
Apply appropriate as mentioned by the vendor:
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop_12.html
Vendor Information
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop_12.html
References
https://chromereleases.googleblog.com/2026/05/stable-channel-update-for-desktop_12.html
CVE Name
CVE-2026-8509
CVE-2026-8510
CVE-2026-8511
CVE-2026-8512
CVE-2026-8513
CVE-2026-8514
CVE-2026-8515
CVE-2026-8516
CVE-2026-8517
CVE-2026-8518
CVE-2026-8519
CVE-2026-8520
CVE-2026-8521
CVE-2026-8522
CVE-2026-8523
CVE-2026-8524
CVE-2026-8525
CVE-2026-8526
CVE-2026-8527
CVE-2026-8528
CVE-2026-8529
CVE-2026-8530
CVE-2026-8531
CVE-2026-8532
CVE-2026-8533
CVE-2026-8534
CVE-2026-8535
CVE-2026-8536
CVE-2026-8537
CVE-2026-8538
CVE-2026-8539
CVE-2026-8540
CVE-2026-8541
CVE-2026-8542
CVE-2026-8543
CVE-2026-8544
CVE-2026-8545
CVE-2026-8546
CVE-2026-8547
CVE-2026-8548
CVE-2026-8549
CVE-2026-8550
CVE-2026-8551
CVE-2026-8552
CVE-2026-8553
CVE-2026-8554
CVE-2026-8555
CVE-2026-8556
CVE-2026-8557
CVE-2026-8558
CVE-2026-8559
CVE-2026-8560
CVE-2026-8561
CVE-2026-8562
CVE-2026-8563
CVE-2026-8564
CVE-2026-8565
CVE-2026-8566
CVE-2026-8567
CVE-2026-8568
CVE-2026-8569
CVE-2026-8570
CVE-2026-8571
CVE-2026-8572
CVE-2026-8573
CVE-2026-8574
CVE-2026-8575
CVE-2026-8576
CVE-2026-8577
CVE-2026-8578
CVE-2026-8579
CVE-2026-8580
CVE-2026-8581
CVE-2026-8582
CVE-2026-8583
CVE-2026-8584
CVE-2026-8585
CVE-2026-8586
CVE-2026-8587
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-22902657
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|