{"id":323777,"date":"2026-04-16T15:33:49","date_gmt":"2026-04-16T13:33:49","guid":{"rendered":"https:\/\/borncity.com\/blog\/?p=323777"},"modified":"2026-04-16T15:33:49","modified_gmt":"2026-04-16T13:33:49","slug":"notfall-update-auf-google-chrome-147-0-7727-101-102-fixt-31-schwachstellen","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2026\/04\/16\/notfall-update-auf-google-chrome-147-0-7727-101-102-fixt-31-schwachstellen\/","title":{"rendered":"Notfall-Update auf Google Chrome 147.0.7727.101\/102 fixt 31 Schwachstellen"},"content":{"rendered":"<p><img decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2021\/06\/Chrome-01.jpg\" \/>[English]Kurzer Hinweis f\u00fcr Nutzer des Google Chrome-Browsers. Google hat zum 15. April 2026 eine neue Version 147.0.7727.101\/102 des Chrome-Browser ver\u00f6ffentlicht, die gleich 31 Schwachstellen (davon 4 kritisch) beseitigt. Die Updates gibt es f\u00fcr den Stable-Channel, aber auch f\u00fcr den Extended Stable-Channel sowie die Android-App. Patchen ist angesagt.<\/p>\n<p><!--more--><\/p>\n<h2>Google Chrome (Stable) 147.0.7727.101\/102<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg04.met.vgwort.de\/na\/ea43de3060184c1582ed717e830517ec\" alt=\"\" width=\"1\" height=\"1\" \/>Der <a href=\"https:\/\/chromereleases.googleblog.com\/2026\/04\/stable-channel-update-for-desktop_15.html\" target=\"_blank\" rel=\"noopener\">betreffende Eintrag<\/a> findet sich im <a href=\"https:\/\/chromereleases.googleblog.com\/\" target=\"_blank\" rel=\"noopener\">Google-Blog<\/a>. Der Stable-Channel wurde per Update f\u00fcr macOS und Windows auf die Version 147.0.7727.101\/102 aktualisiert. F\u00fcr Linux aktualisiert das Update den Browser auf die Version 147.0.7727.101. Laut Google wurden folgende Schwachstellen im Chrome geschlossen.<\/p>\n<ul>\n<li>[$90000][490170083] Critical CVE-2026-6296: Heap buffer overflow in ANGLE. Reported by cinzinga on 2026-03-05<\/li>\n<li>[$10000][493628982] Critical CVE-2026-6297: Use after free in Proxy. Reported by heapracer on 2026-03-17<\/li>\n<li>[TBD][495700484] Critical CVE-2026-6298: Heap buffer overflow in Skia. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-24<\/li>\n<li>[N\/A][497053588] Critical CVE-2026-6299: Use after free in Prerender. Reported by Google on 2026-03-28<\/li>\n<li>[TBD][497724498] Critical CVE-2026-6358: Use after free in XR. Reported by Jihyeon Jeong (Compsec Lab, Seoul National University \/ Research Intern) on 2026-03-30<\/li>\n<li>[TBD][490251701] High CVE-2026-6359: Use after free in Video. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-06<\/li>\n<li>[TBD][491994185] High CVE-2026-6300: Use after free in CSS. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-03-12<\/li>\n<li>[TBD][495273999] High CVE-2026-6301: Type Confusion in Turbofan. Reported by qymag1c on 2026-03-23<\/li>\n<li>[TBD][495477995] High CVE-2026-6302: Use after free in Video. Reported by Syn4pse on 2026-03-24<\/li>\n<li>[N\/A][496282147] High CVE-2026-6303: Use after free in Codecs. Reported by Google on 2026-03-25<\/li>\n<li>[N\/A][496393742] High CVE-2026-6304: Use after free in Graphite. Reported by Google on 2026-03-26<\/li>\n<li>[TBD][496618639] High CVE-2026-6305: Heap buffer overflow in PDFium. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-26<\/li>\n<li>[TBD][496907110] High CVE-2026-6306: Heap buffer overflow in PDFium. Reported by 86ac1f1587b71893ed2ad792cd7dde32 on 2026-03-27<\/li>\n<li>[TBD][497404188] High CVE-2026-6307: Type Confusion in Turbofan. Reported by Project WhatForLunch (@pjwhatforlunch) on 2026-03-29<\/li>\n<li>[N\/A][497412658] High CVE-2026-6308: Out of bounds read in Media. Reported by Google on 2026-03-29<\/li>\n<li>[N\/A][497846428] High CVE-2026-6309: Use after free in Viz. Reported by Google on 2026-03-30<\/li>\n<li>[TBD][497880137] High CVE-2026-6360: Use after free in FileSystem. Reported by asjidkalam on 2026-03-31<\/li>\n<li>[N\/A][497969820] High CVE-2026-6310: Use after free in Dawn. Reported by Google on 2026-03-31<\/li>\n<li>[N\/A][498201025] High CVE-2026-6311: Uninitialized Use in Accessibility. Reported by Google on 2026-03-31<\/li>\n<li>[N\/A][498269651] High CVE-2026-6312: Insufficient policy enforcement in Passwords. Reported by Google on 2026-03-31<\/li>\n<li>[N\/A][498765210] High CVE-2026-6313: Insufficient policy enforcement in CORS. Reported by Google on 2026-04-02<\/li>\n<li>[N\/A][498782145] High CVE-2026-6314: Out of bounds write in GPU. Reported by Google on 2026-04-02<\/li>\n<li>[N\/A][499247910] High CVE-2026-6315: Use after free in Permissions. Reported by Google on 2026-04-03<\/li>\n<li>[N\/A][499384399] High CVE-2026-6316: Use after free in Forms. Reported by Google on 2026-04-03<\/li>\n<li>[N\/A][500036290] High CVE-2026-6361: Heap buffer overflow in PDFium. Reported by Google on 2026-04-06<\/li>\n<li>[TBD][500066234] High CVE-2026-6362: Use after free in Codecs. Reported by c6eed09fc8b174b0f3eebedcceb1e792 on 2026-04-07<\/li>\n<li>[N\/A][500091052] High CVE-2026-6317: Use after free in Cast. Reported by Google on 2026-04-06<\/li>\n<li>[N\/A][495751197] Medium CVE-2026-6363: Type Confusion in V8. Reported by Google on 2026-03-24<\/li>\n<li>[TBD][495996858] Medium CVE-2026-6318: Use after free in Codecs. Reported by Syn4pse on 2026-03-25<\/li>\n<li>[TBD][499018889] Medium CVE-2026-6319: Use after free in Payments. Reported by pwn2addr on 2026-04-02<\/li>\n<li>[N\/A][502103414] Medium CVE-2026-6364: Out of bounds read in Skia. Reported by Google Threat Intelligence on 2026-04-13<\/li>\n<\/ul>\n<p>Sowohl der Google Chrome, als auch der Microsoft Edge-Browser (der auch betroffen ist), sollten sich, sofern betroffen, automatisch aktualisieren. Man kann auch versuchen, den Browser auch manuell (\u00fcber das Men\u00fc und den Befehl <em>\u00dcber Google Chrome<\/em>) zu aktualisieren. Die aktuelle Build des Chrome-Browsers f\u00fcr Windows l\u00e4sst sich auch <a href=\"https:\/\/www.google.com\/chrome\/\" target=\"_blank\" rel=\"noopener\">hier herunterladen<\/a>.<\/p>\n<h2>Google Chrome (Extended) 146.0.7680.201<\/h2>\n<p>Der Extended Stable-Channel wurde <a href=\"https:\/\/chromereleases.googleblog.com\/2026\/04\/extended-stable-updates-for-desktop_15.html\" target=\"_blank\" rel=\"noopener\">per Update<\/a> f\u00fcr macOS und Windows auf die Version Chrome 146.0.7680.201 gebracht.<\/p>\n<h2>Chrome f\u00fcr Android 147.0.7727.101<\/h2>\n<p>Weiterhin hat Google Chrome f\u00fcr Android gem\u00e4\u00df <a href=\"https:\/\/chromereleases.googleblog.com\/2026\/04\/chrome-for-android-update_15.html\" target=\"_blank\" rel=\"noopener\">diesem Google-Post<\/a> auf die Version 147.0.7727.101 aktualisiert und wird in den n\u00e4chsten Tagen per Update verteilt. Diese Version enth\u00e4lt Stabilit\u00e4ts- und Leistungsverbesserungen, sowie die gleichen Sicherheitsfixes wie oben f\u00fcr die Desktop-Versionen des Browsers erw\u00e4hnt.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[English]Kurzer Hinweis f\u00fcr Nutzer des Google Chrome-Browsers. Google hat zum 15. April 2026 eine neue Version 147.0.7727.101\/102 des Chrome-Browser ver\u00f6ffentlicht, die gleich 31 Schwachstellen (davon 4 kritisch) beseitigt. Die Updates gibt es f\u00fcr den Stable-Channel, aber auch f\u00fcr den Extended &hellip; <a href=\"https:\/\/borncity.com\/blog\/2026\/04\/16\/notfall-update-auf-google-chrome-147-0-7727-101-102-fixt-31-schwachstellen\/\">Weiterlesen <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1356,426,185],"tags":[406,4328,4315],"class_list":["post-323777","post","type-post","status-publish","format-standard","hentry","category-google-chrome-internet","category-sicherheit","category-update","tag-chrome","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323777","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=323777"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323777\/revisions"}],"predecessor-version":[{"id":323778,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/323777\/revisions\/323778"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=323777"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=323777"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=323777"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}