CVE-2026-6921 | Google Chrome up to 147.0.7727.101 on Windows GPU race condition
VulDBArchived Apr 23, 2026✓ Full text saved
A vulnerability described as problematic has been identified in Google Chrome on Windows. The impacted element is an unknown function of the component GPU . Such manipulation leads to race condition. This vulnerability is listed as CVE-2026-6921 . The attack may be performed from remote. There is no available exploit. Upgrading the affected component is recommended.
Full text archived locally
✦ AI Summary· Claude Sonnet
VDB-359169 · CVE-2026-6921 · GCVE-0-2026-6921
GOOGLE CHROME UP TO 147.0.7727.101 ON WINDOWS GPU RACE CONDITION
HISTORYDIFFRELATEJSONXMLCTI
CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score
4.8 $5k-$25k 2.34+
Summaryinfo
A vulnerability classified as problematic has been found in Google Chrome on Windows. This affects an unknown function of the component GPU. Performing a manipulation results in race condition. This vulnerability is cataloged as CVE-2026-6921. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component.
Detailsinfo
A vulnerability was found in Google Chrome on Windows. It has been classified as problematic. This affects some unknown processing of the component GPU. The manipulation with an unknown input leads to a race condition vulnerability. CWE is classifying the issue as CWE-362. The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is:
Race in GPU in Google Chrome on Windows prior to 147.0.7727.117 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
The advisory is shared at chromereleases.googleblog.com. This vulnerability is uniquely identified as CVE-2026-6921 since 04/23/2026. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 04/23/2026).
Upgrading to version 147.0.7727.117 eliminates this vulnerability.
Productinfo
Type
Web Browser
Vendor
Google
Name
Chrome
Version
0.2.149.27
0.2.149.29
0.2.149.30
0.2.152.1
0.2.153.1
0.3.154.0
0.3.154.3
0.4.154.18
0.4.154.22
0.4.154.31
0.4.154.33
0.9.126.0
0.10.156.20
0.10.156.50
1.0.154.36
1.0.154.39
1.0.154.42
1.0.154.43
1.0.154.46
1.0.154.48
1.0.154.52
1.0.154.53
1.0.154.59
1.0.154.65
1.2.0
1.2.3
2.0.0
2.0.156.1
2.0.157.0
2.0.157.2
2.0.158.0
2.0.159.0
2.0.169.0
2.0.169.1
2.0.170.0
2.0.172
2.0.172.2
2.0.172.8
2.0.172.27
2.0.172.28
2.0.172.30
2.0.172.31
2.0.172.33
2.0.172.37
2.0.172.38
2.9.5
3.0.182.2
3.0.190.2
3.0.193.2
3.22.24.16
3.24.12
3.42
3.43
4.0.249.0
4.0.263.0
4.1.249.1034
4.1.249.1056
4.6.85.23
4.7.80.23
4.9.385.33
5
5.0.394.0
6.0.462.0
6.0.472.59
7
7.0.517.8
8
8.0.552.209
9
10
11
11.0.696.65
12
12.0.742.30
13
14
14.0.794.0
15
15.0.874.102
15.0.874.121
16.0.912.63
16.0.912.75
16.0.912.77
17.0.963.7
17.0.963.46
17.0.963.56
17.0.963.59
17.0.963.60
17.0.963.65
17.0.963.66
17.0.963.78
17.0.963.79
17.0.963.83
18.0.1025.142
18.0.1025.150
18.0.1025.151
18.0.1025.168
18.0.1025306
18.0.1025308
19.0.1084.45
19.0.1084.46
19.0.1084.51
19.0.1084.52
20.0.1132.29
20.0.1132.43
20.0.1132.57
21.0.1180.6
21.0.1180.57
21.0.1180.63
21.0.1180.74
21.0.1180.75
21.0.1180.80
21.0.1180.82
21.0.1180.83
21.0.1180.89
22.0.1229.76
22.0.1229.79
22.0.1229.92
22.0.1229.94
22.0.1229.96
23.0.1271.13
23.0.1271.64
23.0.1271.91
23.0.1271.91,
23.0.1271.92
23.0.1271.93
23.0.1271.94
23.0.1271.95
23.0.1271.97
23.0.1271.6422.0.1229.94
24.0.1312.52
24.0.1312.56
24.0.1312.71
25.0.1364.42
25.0.1364.95
25.0.1364.97
25.0.1364.99
25.0.1364.126
25.0.1364.152
25.0.1364.160
25.0.1364.173
26.0.1410.27
26.0.1410.28
26.0.1410.31
26.0.1410.43
26.0.1410.53
26.0.1410.57
26.0.1410.64
27.0.1444.0
27.0.1444.3
27.0.1453.93
27.0.1453.94
27.0.1453.110
27.0.1453.116
28.0.1453.116
28.0.1500.71
28.0.1500.72
28.0.1500.95
29.0.1547.57
29.0.1547.76
30.0.1599.16
30.0.1599.66
30.0.1599.69
30.0.1599.101
31
31.0.1650.48
31.0.1650.57
31.0.1650.63
32.0
32.0.1700.75
32.0.1700.76
32.0.1700.77
32.0.1700.95
32.0.1700.102
33.0.1750.58
33.0.1750.117
33.0.1750.146
33.0.1750.149
33.0.1750.152
33.0.1750.154
33.0.1750.166
34.0.1847.114
34.0.1847.115
34.0.1847.116
34.0.1847.130
34.0.1847.131
34.0.1847.137
35.0.1916.114
35.0.1916.153
36.0
36.0.1985.122
36.0.1985.143
37.0.2062.60
37.0.2062.94
37.0.2062.120
38.0.2125
38.0.2125.7
38.0.2125.59
38.0.2125.77
38.0.2125.101
38.0.2125.102
39.0.2171.45
39.0.2171.63
39.0.2171.65
40.0.2214.0
40.0.2214.85
40.0.2214.89
40.0.2214.91
40.0.2214.93
40.0.2214.111
40.0.2214.115
41.0.2251.0
41.0.2272.76
41.0.2272.118
42
42.0.2311.90
42.0.2311.135
43
43.0.2357.65
43.0.2357.81
43.0.2357.124
43.0.2357.130
44.0.2403.89
45
45.0.2454.85
45.0.2454.101
46
46.0.2490.71
46.0.2490.86
47
47.0.2526.73
47.0.2526.80
47.0.2526.106
48.0.2540.0 dev-m
48.0.2564.82
48.0.2564.109
48.0.2564.116
49
49.0
49.0.2623.0
49.0.2623.75
49.0.2623.87
49.0.2623.108
50
50.0.2661.75
50.0.2661.94
50.0.2661.102
51.0.2704.63
51.0.2704.79
51.0.2704.103
52.0.2743.82
52.0.2743.85
52.0.2743.116
53.0
53.0.2785.89
53.0.2785.92
53.0.2785.103
53.0.2785.113
53.0.2785.143
53.0.2785.144
54.0
54.0.2840.59
54.0.2840.85
54.0.2840.87
54.0.2840.98
54.0.2840.99
54.0.2840.100
55.0.2883.75
56.0.2924.76
57.0.2987.75
57.0.2987.98
57.0.2987.100
57.0.2987.133
58.0.3029.81
58.0.3029.96
59
59.0.3071.86
59.0.3071.92
59.0.3071.104
59.0.3071.115
60.0.3112.78
61.0.3163.79
61.0.3163.100
61.0.3163.113
62.0.3202.62
62.0.3202.74
62.0.3202.75
62.0.3202.89
62.0.3202.94
63.0.3239.84
63.0.3239.108
64.0.3282.119
64.0.3282.168
65.0.3325.146
66.0.3359.106
66.0.3359.117
66.0.3359.139
66.0.3359.170
67.0.3396.62
67.0.3396.79
67.0.3396.87
68.0.3440.75
69.0.3497.81
69.0.3497.92
70.0.3538.67
70.0.3538.102
70.0.3538.110
71.0.3578.80
72.0.3626.81
72.0.3626.96
72.0.3626.121
73.0.3683.75
73.0.3683.86
73.0.3683.103
74.0.3729.108
74.0.3729.131
75.0.3770.80
75.0.3770.90
75.0.3770.142
76.0.3809.87
76.0.3809.100
76.0.3809.132
77.0.3865.75
77.0.3865.90
77.0.3865.120
78.0.3904.70
78.0.3904.87
78.0.3904.108
79.0.3945.79
79.0.3945.88
79.0.3945.117
79.0.3945.130
80.0.3987.87
80.0.3987.116
80.0.3987.122
80.0.3987.132
80.0.3987.149
80.0.3987.162
81.0.4044.92
81.0.4044.113
81.0.4044.122
81.0.4044.129
81.0.4044.138
83.0.4103.61
83.0.4103.88
83.0.4103.97
83.0.4103.106
83.0.4103.116
84.0.4147.89
84.0.4147.105
84.0.4147.125
84.0.4147.135
85.0.4183.83
85.0.4183.102
85.0.4183.121
86.0.4240.75
86.0.4240.99
86.0.4240.111
86.0.4240.183
86.0.4240.185
86.0.4240.193
86.0.4240.198
87.0.4280.66
87.0.4280.88
87.0.4280.141
88.0.4324.96
88.0.4324.146
88.0.4324.150
88.0.4324.182
89.0.4389.72
89.0.4389.90
89.0.4389.114
89.0.4389.128
90.0.4430.72
90.0.4430.85
90.0.4430.93
90.0.4430.212
91.0.4472.77
91.0.4472.101
91.0.4472.114
91.0.4472.164
92.0.4515.107
92.0.4515.131
92.0.4515.159
93.0.4577.63
93.0.4577.82
94.0.4606.54
94.0.4606.61
94.0.4606.71
94.0.4606.81
95.0.4638.54
95.0.4638.69
96.0.4664.45
96.0.4664.93
96.0.4664.110
97.0.4692.71
97.0.4692.99
98.0.4758.80
98.0.4758.102
99.0.4844.51
99.0.4844.74
99.0.4844.84
100.0.4896.60
100.0.4896.75
100.0.4896.88
100.0.4896.127
101.0.4951.41
101.0.4951.64
102.0.5005.61
102.0.5005.115
102.0.5005.125
102.0.5005.148
103.0.5060.53
103.0.5060.114
103.0.5060.134
104.0.5112.79
104.0.5112.101
104.0.5112.102
105.0.5195.52
105.0.5195.102
105.0.5195.125
106.0.5249.61
106.0.5249.62
106.0.5249.91
106.0.5249.119
107.0.5304.62
107.0.5304.87
107.0.5304.121
108.0.5359.71
108.0.5359.94
108.0.5359.124
109.0.5414.74
109.0.5414.119
110.0.5481.77
110.0.5481.177
111.0.5563.64
111.0.5563.110
112.0.5615.49
112.0.5615.121
112.0.5615.137
113.0.5672.63
113.0.5672.114
113.0.5672.126
114.0.5735.90
114.0.5735.110
114.0.5735.133
114.0.5735.198
115.0.5790.98
115.0.5790.170
116.0.5845.96
116.0.5845.110
116.0.5845.140
116.0.5845.179
117.0.5938.62
117.0.5938.132
117.0.5938.149
118.0.5993.70
118.0.5993.117
119.0.6045.105
119.0.6045.123
119.0.6045.159
119.0.6045.199
120.0.6099.62
120.0.6099.109
120.0.6099.129
120.0.6099.199
120.0.6099.216
120.0.6099.224
121.0.6167.85
121.0.6167.139
121.0.6167.160
122.0.6261.57
122.0.6261.94
122.0.6261.111
122.0.6261.128
123.0.6312.58
123.0.6312.86
123.0.6312.105
123.0.6312.122
124.0.6367.60
124.0.6367.78
124.0.6367.118
124.0.6367.155
124.0.6367.201
124.0.6367.207
125.0.6422.60
125.0.6422.76
125.0.6422.112
125.0.6422.141
126.0.6478.54
126.0.6478.114
126.0.6478.126
126.0.6478.182
127
127.0.6533.72
127.0.6533.88
127.0.6533.99
128
128.0.6537.0
128.0.6613.84
128.0.6613.113
128.0.6613.119
128.0.6613.137
129
129.0.6668.58
129.0.6668.70
129.0.6668.89
129.0.6668.100
130.0.6723.58
130.0.6723.69
130.0.6723.92
130.0.6723.116
131.0.6778.69
131.0.6778.85
131.0.6778.108
131.0.6778.139
131.0.6778.204
131.0.6778.264
132.0.6834.83
132.0.6834.110
132.0.6834.159
133.0.6943.53
133.0.6943.98
133.0.6943.126
133.0.6943.141
134.0.6998.35
134.0.6998.88
134.0.6998.117
134.0.6998.177
135.0.7049.41
135.0.7049.95
136.0.7103.48
136.0.7103.59
136.0.7103.92
136.0.7103.113
137.0.7151.11
137.0.7151.55
137.0.7151.68
137.0.7151.103
138.0.7204.49
138.0.7204.96
138.0.7204.157
138.0.7204.168
138.0.7204.183
139.0.7258.66
139.0.7258.127
139.0.7258.138
139.0.7258.154
140.0.7339.80
140.0.7339.127
140.0.7339.185
140.0.7339.207
141.0.7390.54
141.0.7390.65
141.0.7390.107
141.0.7390.122
142.0.7444.59
142.0.7444.134
142.0.7444.166
142.0.7444.175
143.0.7499.41
143.0.7499.109
143.0.7499.110
143.0.7499.146
143.0.7499.192
144.0.7559.59
144.0.7559.96
144.0.7559.110
144.0.7559.132
145.0.7632.45
145.0.7632.75
145.0.7632.109
145.0.7632.116
145.0.7632.159
146.0.7680.71
146.0.7680.75
146.0.7680.153
146.0.7680.165
146.0.7680.178
147.0.7727.55
147.0.7727.101
License
free
Website
Vendor: https://www.google.com/
Product: https://www.google.com/chrome/
CPE 2.3info
🔒
🔒
🔒
CPE 2.2info
🔒
🔒
🔒
CVSSv4info
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv3info
VulDB Meta Base Score: 5.0
VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.0
VulDB Temp Score: 4.8
VulDB Vector: 🔒
VulDB Reliability: 🔍
CVSSv2info
Vector Complexity Authentication Confidentiality Integrity Availability
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
Unlock Unlock Unlock Unlock Unlock Unlock
VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍
Exploitinginfo
Class: Race condition
CWE: CWE-362
CAPEC: 🔒
ATT&CK: 🔒
Physical: No
Local: No
Remote: Yes
Availability: 🔒
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔒
0-Day Unlock Unlock Unlock Unlock
Today Unlock Unlock Unlock Unlock
Threat Intelligenceinfo
Interest: 🔍
Active Actors: 🔍
Active APT Groups: 🔍
Countermeasuresinfo
Recommended: Upgrade
Status: 🔍
0-Day Time: 🔒
Upgrade: Chrome 147.0.7727.117
Timelineinfo
04/23/2026 Advisory disclosed
04/23/2026 +0 days CVE reserved
04/23/2026 +0 days VulDB entry created
04/23/2026 +0 days VulDB entry last update
Sourcesinfo
Vendor: google.com
Product: google.com
Advisory: chromereleases.googleblog.com
Status: Confirmed
CVE: CVE-2026-6921 (🔒)
GCVE (CVE): GCVE-0-2026-6921
GCVE (VulDB): GCVE-100-359169
Entryinfo
Created: 04/23/2026 19:54
Changes: 04/23/2026 19:54 (22), 04/23/2026 19:55 (35)
Complete: 🔍
Cache ID: 99:B4A:101
Discussion
No comments yet. Languages: en.
Please log in to comment.
◂ PreviousOverviewNext ▸