CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ⬡ Vulnerabilities & CVEs Apr 23, 2026

CVE-2026-6921 | Google Chrome up to 147.0.7727.101 on Windows GPU race condition

VulDB Archived Apr 23, 2026 ✓ Full text saved

A vulnerability described as problematic has been identified in Google Chrome on Windows. The impacted element is an unknown function of the component GPU . Such manipulation leads to race condition. This vulnerability is listed as CVE-2026-6921 . The attack may be performed from remote. There is no available exploit. Upgrading the affected component is recommended.

Full text archived locally
✦ AI Summary · Claude Sonnet


    VDB-359169 · CVE-2026-6921 · GCVE-0-2026-6921 GOOGLE CHROME UP TO 147.0.7727.101 ON WINDOWS GPU RACE CONDITION HISTORYDIFFRELATEJSONXMLCTI CVSS Meta Temp Score Current Exploit Price (≈) CTI Interest Score 4.8 $5k-$25k 2.34+ Summaryinfo A vulnerability classified as problematic has been found in Google Chrome on Windows. This affects an unknown function of the component GPU. Performing a manipulation results in race condition. This vulnerability is cataloged as CVE-2026-6921. It is possible to initiate the attack remotely. There is no exploit available. It is recommended to upgrade the affected component. Detailsinfo A vulnerability was found in Google Chrome on Windows. It has been classified as problematic. This affects some unknown processing of the component GPU. The manipulation with an unknown input leads to a race condition vulnerability. CWE is classifying the issue as CWE-362. The product contains a code sequence that can run concurrently with other code, and the code sequence requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence that is operating concurrently. This is going to have an impact on confidentiality, integrity, and availability. The summary by CVE is: Race in GPU in Google Chrome on Windows prior to 147.0.7727.117 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium) The advisory is shared at chromereleases.googleblog.com. This vulnerability is uniquely identified as CVE-2026-6921 since 04/23/2026. The exploitability is told to be difficult. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. It demands that the victim is doing some kind of user interaction. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 04/23/2026). Upgrading to version 147.0.7727.117 eliminates this vulnerability. Productinfo Type Web Browser Vendor Google Name Chrome Version 0.2.149.27 0.2.149.29 0.2.149.30 0.2.152.1 0.2.153.1 0.3.154.0 0.3.154.3 0.4.154.18 0.4.154.22 0.4.154.31 0.4.154.33 0.9.126.0 0.10.156.20 0.10.156.50 1.0.154.36 1.0.154.39 1.0.154.42 1.0.154.43 1.0.154.46 1.0.154.48 1.0.154.52 1.0.154.53 1.0.154.59 1.0.154.65 1.2.0 1.2.3 2.0.0 2.0.156.1 2.0.157.0 2.0.157.2 2.0.158.0 2.0.159.0 2.0.169.0 2.0.169.1 2.0.170.0 2.0.172 2.0.172.2 2.0.172.8 2.0.172.27 2.0.172.28 2.0.172.30 2.0.172.31 2.0.172.33 2.0.172.37 2.0.172.38 2.9.5 3.0.182.2 3.0.190.2 3.0.193.2 3.22.24.16 3.24.12 3.42 3.43 4.0.249.0 4.0.263.0 4.1.249.1034 4.1.249.1056 4.6.85.23 4.7.80.23 4.9.385.33 5 5.0.394.0 6.0.462.0 6.0.472.59 7 7.0.517.8 8 8.0.552.209 9 10 11 11.0.696.65 12 12.0.742.30 13 14 14.0.794.0 15 15.0.874.102 15.0.874.121 16.0.912.63 16.0.912.75 16.0.912.77 17.0.963.7 17.0.963.46 17.0.963.56 17.0.963.59 17.0.963.60 17.0.963.65 17.0.963.66 17.0.963.78 17.0.963.79 17.0.963.83 18.0.1025.142 18.0.1025.150 18.0.1025.151 18.0.1025.168 18.0.1025306 18.0.1025308 19.0.1084.45 19.0.1084.46 19.0.1084.51 19.0.1084.52 20.0.1132.29 20.0.1132.43 20.0.1132.57 21.0.1180.6 21.0.1180.57 21.0.1180.63 21.0.1180.74 21.0.1180.75 21.0.1180.80 21.0.1180.82 21.0.1180.83 21.0.1180.89 22.0.1229.76 22.0.1229.79 22.0.1229.92 22.0.1229.94 22.0.1229.96 23.0.1271.13 23.0.1271.64 23.0.1271.91 23.0.1271.91, 23.0.1271.92 23.0.1271.93 23.0.1271.94 23.0.1271.95 23.0.1271.97 23.0.1271.6422.0.1229.94 24.0.1312.52 24.0.1312.56 24.0.1312.71 25.0.1364.42 25.0.1364.95 25.0.1364.97 25.0.1364.99 25.0.1364.126 25.0.1364.152 25.0.1364.160 25.0.1364.173 26.0.1410.27 26.0.1410.28 26.0.1410.31 26.0.1410.43 26.0.1410.53 26.0.1410.57 26.0.1410.64 27.0.1444.0 27.0.1444.3 27.0.1453.93 27.0.1453.94 27.0.1453.110 27.0.1453.116 28.0.1453.116 28.0.1500.71 28.0.1500.72 28.0.1500.95 29.0.1547.57 29.0.1547.76 30.0.1599.16 30.0.1599.66 30.0.1599.69 30.0.1599.101 31 31.0.1650.48 31.0.1650.57 31.0.1650.63 32.0 32.0.1700.75 32.0.1700.76 32.0.1700.77 32.0.1700.95 32.0.1700.102 33.0.1750.58 33.0.1750.117 33.0.1750.146 33.0.1750.149 33.0.1750.152 33.0.1750.154 33.0.1750.166 34.0.1847.114 34.0.1847.115 34.0.1847.116 34.0.1847.130 34.0.1847.131 34.0.1847.137 35.0.1916.114 35.0.1916.153 36.0 36.0.1985.122 36.0.1985.143 37.0.2062.60 37.0.2062.94 37.0.2062.120 38.0.2125 38.0.2125.7 38.0.2125.59 38.0.2125.77 38.0.2125.101 38.0.2125.102 39.0.2171.45 39.0.2171.63 39.0.2171.65 40.0.2214.0 40.0.2214.85 40.0.2214.89 40.0.2214.91 40.0.2214.93 40.0.2214.111 40.0.2214.115 41.0.2251.0 41.0.2272.76 41.0.2272.118 42 42.0.2311.90 42.0.2311.135 43 43.0.2357.65 43.0.2357.81 43.0.2357.124 43.0.2357.130 44.0.2403.89 45 45.0.2454.85 45.0.2454.101 46 46.0.2490.71 46.0.2490.86 47 47.0.2526.73 47.0.2526.80 47.0.2526.106 48.0.2540.0 dev-m 48.0.2564.82 48.0.2564.109 48.0.2564.116 49 49.0 49.0.2623.0 49.0.2623.75 49.0.2623.87 49.0.2623.108 50 50.0.2661.75 50.0.2661.94 50.0.2661.102 51.0.2704.63 51.0.2704.79 51.0.2704.103 52.0.2743.82 52.0.2743.85 52.0.2743.116 53.0 53.0.2785.89 53.0.2785.92 53.0.2785.103 53.0.2785.113 53.0.2785.143 53.0.2785.144 54.0 54.0.2840.59 54.0.2840.85 54.0.2840.87 54.0.2840.98 54.0.2840.99 54.0.2840.100 55.0.2883.75 56.0.2924.76 57.0.2987.75 57.0.2987.98 57.0.2987.100 57.0.2987.133 58.0.3029.81 58.0.3029.96 59 59.0.3071.86 59.0.3071.92 59.0.3071.104 59.0.3071.115 60.0.3112.78 61.0.3163.79 61.0.3163.100 61.0.3163.113 62.0.3202.62 62.0.3202.74 62.0.3202.75 62.0.3202.89 62.0.3202.94 63.0.3239.84 63.0.3239.108 64.0.3282.119 64.0.3282.168 65.0.3325.146 66.0.3359.106 66.0.3359.117 66.0.3359.139 66.0.3359.170 67.0.3396.62 67.0.3396.79 67.0.3396.87 68.0.3440.75 69.0.3497.81 69.0.3497.92 70.0.3538.67 70.0.3538.102 70.0.3538.110 71.0.3578.80 72.0.3626.81 72.0.3626.96 72.0.3626.121 73.0.3683.75 73.0.3683.86 73.0.3683.103 74.0.3729.108 74.0.3729.131 75.0.3770.80 75.0.3770.90 75.0.3770.142 76.0.3809.87 76.0.3809.100 76.0.3809.132 77.0.3865.75 77.0.3865.90 77.0.3865.120 78.0.3904.70 78.0.3904.87 78.0.3904.108 79.0.3945.79 79.0.3945.88 79.0.3945.117 79.0.3945.130 80.0.3987.87 80.0.3987.116 80.0.3987.122 80.0.3987.132 80.0.3987.149 80.0.3987.162 81.0.4044.92 81.0.4044.113 81.0.4044.122 81.0.4044.129 81.0.4044.138 83.0.4103.61 83.0.4103.88 83.0.4103.97 83.0.4103.106 83.0.4103.116 84.0.4147.89 84.0.4147.105 84.0.4147.125 84.0.4147.135 85.0.4183.83 85.0.4183.102 85.0.4183.121 86.0.4240.75 86.0.4240.99 86.0.4240.111 86.0.4240.183 86.0.4240.185 86.0.4240.193 86.0.4240.198 87.0.4280.66 87.0.4280.88 87.0.4280.141 88.0.4324.96 88.0.4324.146 88.0.4324.150 88.0.4324.182 89.0.4389.72 89.0.4389.90 89.0.4389.114 89.0.4389.128 90.0.4430.72 90.0.4430.85 90.0.4430.93 90.0.4430.212 91.0.4472.77 91.0.4472.101 91.0.4472.114 91.0.4472.164 92.0.4515.107 92.0.4515.131 92.0.4515.159 93.0.4577.63 93.0.4577.82 94.0.4606.54 94.0.4606.61 94.0.4606.71 94.0.4606.81 95.0.4638.54 95.0.4638.69 96.0.4664.45 96.0.4664.93 96.0.4664.110 97.0.4692.71 97.0.4692.99 98.0.4758.80 98.0.4758.102 99.0.4844.51 99.0.4844.74 99.0.4844.84 100.0.4896.60 100.0.4896.75 100.0.4896.88 100.0.4896.127 101.0.4951.41 101.0.4951.64 102.0.5005.61 102.0.5005.115 102.0.5005.125 102.0.5005.148 103.0.5060.53 103.0.5060.114 103.0.5060.134 104.0.5112.79 104.0.5112.101 104.0.5112.102 105.0.5195.52 105.0.5195.102 105.0.5195.125 106.0.5249.61 106.0.5249.62 106.0.5249.91 106.0.5249.119 107.0.5304.62 107.0.5304.87 107.0.5304.121 108.0.5359.71 108.0.5359.94 108.0.5359.124 109.0.5414.74 109.0.5414.119 110.0.5481.77 110.0.5481.177 111.0.5563.64 111.0.5563.110 112.0.5615.49 112.0.5615.121 112.0.5615.137 113.0.5672.63 113.0.5672.114 113.0.5672.126 114.0.5735.90 114.0.5735.110 114.0.5735.133 114.0.5735.198 115.0.5790.98 115.0.5790.170 116.0.5845.96 116.0.5845.110 116.0.5845.140 116.0.5845.179 117.0.5938.62 117.0.5938.132 117.0.5938.149 118.0.5993.70 118.0.5993.117 119.0.6045.105 119.0.6045.123 119.0.6045.159 119.0.6045.199 120.0.6099.62 120.0.6099.109 120.0.6099.129 120.0.6099.199 120.0.6099.216 120.0.6099.224 121.0.6167.85 121.0.6167.139 121.0.6167.160 122.0.6261.57 122.0.6261.94 122.0.6261.111 122.0.6261.128 123.0.6312.58 123.0.6312.86 123.0.6312.105 123.0.6312.122 124.0.6367.60 124.0.6367.78 124.0.6367.118 124.0.6367.155 124.0.6367.201 124.0.6367.207 125.0.6422.60 125.0.6422.76 125.0.6422.112 125.0.6422.141 126.0.6478.54 126.0.6478.114 126.0.6478.126 126.0.6478.182 127 127.0.6533.72 127.0.6533.88 127.0.6533.99 128 128.0.6537.0 128.0.6613.84 128.0.6613.113 128.0.6613.119 128.0.6613.137 129 129.0.6668.58 129.0.6668.70 129.0.6668.89 129.0.6668.100 130.0.6723.58 130.0.6723.69 130.0.6723.92 130.0.6723.116 131.0.6778.69 131.0.6778.85 131.0.6778.108 131.0.6778.139 131.0.6778.204 131.0.6778.264 132.0.6834.83 132.0.6834.110 132.0.6834.159 133.0.6943.53 133.0.6943.98 133.0.6943.126 133.0.6943.141 134.0.6998.35 134.0.6998.88 134.0.6998.117 134.0.6998.177 135.0.7049.41 135.0.7049.95 136.0.7103.48 136.0.7103.59 136.0.7103.92 136.0.7103.113 137.0.7151.11 137.0.7151.55 137.0.7151.68 137.0.7151.103 138.0.7204.49 138.0.7204.96 138.0.7204.157 138.0.7204.168 138.0.7204.183 139.0.7258.66 139.0.7258.127 139.0.7258.138 139.0.7258.154 140.0.7339.80 140.0.7339.127 140.0.7339.185 140.0.7339.207 141.0.7390.54 141.0.7390.65 141.0.7390.107 141.0.7390.122 142.0.7444.59 142.0.7444.134 142.0.7444.166 142.0.7444.175 143.0.7499.41 143.0.7499.109 143.0.7499.110 143.0.7499.146 143.0.7499.192 144.0.7559.59 144.0.7559.96 144.0.7559.110 144.0.7559.132 145.0.7632.45 145.0.7632.75 145.0.7632.109 145.0.7632.116 145.0.7632.159 146.0.7680.71 146.0.7680.75 146.0.7680.153 146.0.7680.165 146.0.7680.178 147.0.7727.55 147.0.7727.101 License free Website Vendor: https://www.google.com/ Product: https://www.google.com/chrome/ CPE 2.3info 🔒 🔒 🔒 CPE 2.2info 🔒 🔒 🔒 CVSSv4info VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv3info VulDB Meta Base Score: 5.0 VulDB Meta Temp Score: 4.8 VulDB Base Score: 5.0 VulDB Temp Score: 4.8 VulDB Vector: 🔒 VulDB Reliability: 🔍 CVSSv2info Vector Complexity Authentication Confidentiality Integrity Availability Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock Unlock VulDB Base Score: 🔒 VulDB Temp Score: 🔒 VulDB Reliability: 🔍 Exploitinginfo Class: Race condition CWE: CWE-362 CAPEC: 🔒 ATT&CK: 🔒 Physical: No Local: No Remote: Yes Availability: 🔒 Status: Not defined Price Prediction: 🔍 Current Price Estimation: 🔒 0-Day Unlock Unlock Unlock Unlock Today Unlock Unlock Unlock Unlock Threat Intelligenceinfo Interest: 🔍 Active Actors: 🔍 Active APT Groups: 🔍 Countermeasuresinfo Recommended: Upgrade Status: 🔍 0-Day Time: 🔒 Upgrade: Chrome 147.0.7727.117 Timelineinfo 04/23/2026 Advisory disclosed 04/23/2026 +0 days CVE reserved 04/23/2026 +0 days VulDB entry created 04/23/2026 +0 days VulDB entry last update Sourcesinfo Vendor: google.com Product: google.com Advisory: chromereleases.googleblog.com Status: Confirmed CVE: CVE-2026-6921 (🔒) GCVE (CVE): GCVE-0-2026-6921 GCVE (VulDB): GCVE-100-359169 Entryinfo Created: 04/23/2026 19:54 Changes: 04/23/2026 19:54 (22), 04/23/2026 19:55 (35) Complete: 🔍 Cache ID: 99:B4A:101 Discussion No comments yet. Languages: en. Please log in to comment. ◂ PreviousOverviewNext ▸
    💬 Team Notes
    Article Info
    Source
    VulDB
    Category
    ⬡ Vulnerabilities & CVEs
    Published
    Apr 23, 2026
    Archived
    Apr 23, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗