Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

506+ Articles
116+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-5272: Chrome GPU Heap Buffer Overflow Enables Remote Code Execution
CVE-2026-5272: Chrome GPU Heap Buffer Overflow Enables Remote Code Execution
SECURITYHIGHCVE-2026-5272

CVE-2026-5272: Chrome GPU Heap Buffer Overflow Enables Remote Code Execution

A high-severity heap buffer overflow in Chrome's GPU component allows remote attackers to execute arbitrary code via a crafted HTML page. Affects all Chrome versions prior to 146.0.7680.178.

Dylan H.

Security Team

April 1, 2026
4 min read

Affected Products

  • Google Chrome < 146.0.7680.178 (All platforms)
  • Chromium-based browsers (pending vendor patches)

Executive Summary

Google has patched CVE-2026-5272, a high-severity heap buffer overflow vulnerability in Chrome's GPU component affecting all Chrome versions prior to 146.0.7680.178. The flaw can be exploited remotely by tricking a user into visiting a crafted HTML page, potentially resulting in arbitrary code execution within the browser process.

CVSS Score: 8.8 (High)

All Chrome users should update to version 146.0.7680.178 or later immediately.


Vulnerability Details

Root Cause

CVE-2026-5272 is a heap buffer overflow in Chrome's GPU process. Heap buffer overflows occur when a program writes more data to a buffer allocated on the heap than the buffer can hold, corrupting adjacent memory. In a browser context, GPU process vulnerabilities are particularly significant because:

  1. The GPU process handles rendering operations with elevated hardware privileges
  2. Overflow conditions can overwrite heap metadata or adjacent allocations
  3. Attackers controlling overwritten data can redirect execution flow
  4. Successful exploitation achieves code execution inside the GPU process sandbox

Exploitation Path

VectorDetails
Attack VectorNetwork (remote)
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired (visit crafted HTML page)
ScopeUnchanged
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh

The attack is triggered purely through a maliciously crafted HTML page — no additional plugins, extensions, or user actions beyond visiting the page are required.


Affected Versions

PlatformVulnerable VersionsFixed Version
WindowsChrome < 146.0.7680.178146.0.7680.178/.179
macOSChrome < 146.0.7680.178146.0.7680.178/.179
LinuxChrome < 146.0.7680.178146.0.7680.178
AndroidChrome for Android < 146.0.7680.178146.0.7680.178

Chromium-based browsers including Microsoft Edge, Brave, Opera, Vivaldi, and Arc share Chrome's GPU infrastructure and may also be affected until their vendors ship updated versions.


Immediate Remediation

Update Chrome

  1. Open Chrome and navigate to chrome://settings/help
  2. Chrome will check for and download the update automatically
  3. Click Relaunch when prompted to apply the update

Verify the installed version shows 146.0.7680.178 or higher.

Enterprise Deployment

# Windows — verify current Chrome version
Get-ItemProperty "HKLM:\SOFTWARE\Google\Chrome\BLBeacon" -Name "version"
 
# Force update check via registry policy
Set-ItemProperty -Path "HKLM:\SOFTWARE\Policies\Google\Update" `
  -Name "Update{8A69D345-D564-463C-AFF1-A69D9E530F96}" -Value 1
 
# Trigger update agent
& "C:\Program Files\Google\Update\GoogleUpdate.exe" /ua /installsource scheduler
# Linux — update via package manager
sudo apt-get update && sudo apt-get install --only-upgrade google-chrome-stable
 
# macOS — update via Homebrew
brew upgrade --cask google-chrome

Temporary Mitigations (If Patching Is Delayed)

  • Disable GPU acceleration — chrome://flags/#disable-accelerated-2d-canvas and chrome://flags/#ignore-gpu-blocklist — reduces attack surface but impacts performance
  • Enable Enhanced Safe Browsing — Settings → Privacy and Security → Security → Enhanced protection
  • Restrict browsing to known-good, trusted sites until the patch is applied
  • Consider browser isolation platforms for high-risk users

Detection

Process Monitoring

GPU process exploitation may manifest as:

  • Unexpected chrome --type=gpu-process child process crashes
  • Renderer or GPU process spawning unusual child processes
  • High-frequency GPU process restarts

Log Indicators

# Windows Event Log — look for Chrome GPU crashes
Get-WinEvent -LogName Application | Where-Object {
  $_.ProviderName -eq "Application Error" -and
  $_.Message -match "chrome.exe"
} | Select-Object TimeCreated, Message
 
# Linux crash logs
journalctl -xe | grep -i "chrome" | grep -i "crash\|segfault\|gpu"

Network Indicators

  • Browser processes making unexpected outbound connections to unusual IP ranges
  • Large, complex HTML/WebGL payloads delivered from newly registered domains
  • Renderer process initiating connections not typically associated with browsing activity

Timeline

DateEvent
2026-04-01CVE-2026-5272 published to NVD
2026-04-01Google releases Chrome 146.0.7680.178 with fix
2026-04-01Security advisory issued (Chromium severity: High)

References

  • NVD — CVE-2026-5272
  • Google Chrome Releases Blog
  • Chromium Security Advisory
#CVE#Google#Chrome#NVD#Vulnerability#Heap Buffer Overflow#GPU#Remote Code Execution

Related Articles

CVE-2026-32973: OpenClaw Exec Allowlist Bypass via Glob Wildcard Overmatch

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to bypass the exec allowlist by exploiting improper glob pattern normalization where the ? wildcard ovematches across POSIX path segments.

5 min read

CVE-2026-32975: OpenClaw Zalouser Weak Authorization via Mutable Group Display Names

A critical CVSS 9.8 authorization bypass in OpenClaw's Zalouser allowlist mode matches mutable group display names instead of stable identifiers, letting attackers create spoofed groups to hijack channel routing.

5 min read

CVE-2026-32987: OpenClaw Bootstrap Code Replay Enables Privilege Escalation to operator.admin

A critical CVSS 9.8 vulnerability in OpenClaw allows attackers to replay a valid bootstrap setup code multiple times before approval, escalating device pairing scopes up to operator.admin privilege level.

5 min read
Back to all Security Alerts