Description
Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-03-11
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Memory corruption
Action: Immediate Patch
AI Analysis

Impact

The vulnerability manifests as a heap buffer overflow in the Skia graphics library of Google Chrome, permitting a remote attacker to supply a specially crafted HTML page that triggers an out‑of‑bounds write and corrupts memory. According to the official CWE IDs, the flaw is a classic heap overflow (CWE‑122) combined with an out‑of‑bounds write (CWE‑787). The result is arbitrary memory corruption that may lead to remote code execution on the victim’s machine.

Affected Systems

The flaw affects Google Chrome version 146.0.7680.70 and older across all desktop operating systems supported by Chrome, including Windows, macOS, and Linux. The vulnerability is tied to the Skia graphics subsystem, which is common to all Chrome releases prior to 146.0.7680.71.

Risk and Exploitability

The CVSS score of 8.8 classifies this vulnerability as high severity, and the EPSS score of less than 1% suggests that exploitation is unlikely at the moment, although the flaw has not been reported in the CISA Known Exploited Vulnerabilities catalog. The attack vector is remote, relying on a crafted HTML page delivered over the network to a victim’s browser. Because the bug resides in a heap buffer, an attacker could potentially overwrite arbitrary data, elevate privileges within the browser process, or execute injected code, assuming the user allows HTML content from untrusted sources. While there are no publicly disclosed exploits as of this analysis, the high CVSS and potential for remote code execution warrant immediate patching.

Generated by OpenCVE AI on April 17, 2026 at 11:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 146.0.7680.71 or newer on all devices.
  • If an update cannot be applied immediately, filter out malicious or untrusted HTML content using a web security gateway that enforces strict content security policies and blocks inline scripts.
  • Maintain up‑to‑date OS and browser sandbox configurations to contain any accidental code execution, and apply regular patch management for all Chrome installations.

Generated by OpenCVE AI on April 17, 2026 at 11:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6164-1 chromium security update
History

Fri, 13 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows
Weaknesses CWE-787
CPEs cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos
Linux
Linux linux Kernel
Microsoft
Microsoft windows

Fri, 13 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Title chromium-browser: Heap buffer overflow in Skia
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 12 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Wed, 11 Mar 2026 22:15:00 +0000

Type Values Removed Values Added
Description Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-122
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-03-13T03:55:39.852Z

Reserved: 2026-03-11T05:54:13.050Z

Link: CVE-2026-3931

cve-icon Vulnrichment

Updated: 2026-03-12T15:12:29.976Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T22:16:35.803

Modified: 2026-03-13T15:41:38.623

Link: CVE-2026-3931

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-10T00:00:00Z

Links: CVE-2026-3931 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:45:06Z

Weaknesses