Alert GCSA-26039 - Aggiornamento di sicurezza per Google Chrome
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26039
Tata: 12 Marzo 2026
titolo: Aggiornamento di sicurezza per Google Chrome
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Google Chrome,
che potrebbero essere sfruttate da un attaccante remoto
per eseguire codice arbitrario, rivelare informazioni sensibili,
eludere policy di sicurezza, innescare spoofing e condizioni di
Denial of Service su un sistema che ne sia affetto.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Google Chrome versioni precedenti alla 146.0.7680.71/72 per Windows
Google Chrome versioni precedenti alla 146.0.7680.71/72 per Mac
Google Chrome versioni precedenti alla 146.0.7680.71 per Linux
:: Impatto
Accesso a dati riservati (ID)
Denial of Service (DoS)
Elusione delle restrizoni di sicurezza (SRB)
Esecuzione remota di codice arbitrario (RCE)
Spoofing
:: Soluzioni
Aggiornare alla versione piu' recente.
L'aggiornamento sara' automatico per tutte le installazioni
in cui non sia stata disattivata l'opzione "aggiornamento automatico".
Gli utenti desktop possono verificare la propria versione di Chrome, ed
attivare un aggiornamento, scegliendo dal menu (icona 3 punti verticali) la voce
Guida -> Informazioni su Googlo Chrome
oppure navigando su chrome://settings/help
Per l'installazione manuale scaricare il prodotto dal sito ufficiale:
http://www.google.com/chrome/?hl=it
:: Riferimenti
Google Chrome Releases
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3942
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCabJ5Dg0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBCgccAn3zzhanbQtnPjFN4YKaGV6O533SFAJ9bZOUKeK7Z
1geu8VaYSnz/C8WY9g==
=aG6Q
-----END PGP SIGNATURE-----
Hash: SHA256
******************************************************************
Alert ID: GCSA-26039
Tata: 12 Marzo 2026
titolo: Aggiornamento di sicurezza per Google Chrome
******************************************************************
:: Descrizione del problema
Sono state identificate vulnerabilita' multiple in Google Chrome,
che potrebbero essere sfruttate da un attaccante remoto
per eseguire codice arbitrario, rivelare informazioni sensibili,
eludere policy di sicurezza, innescare spoofing e condizioni di
Denial of Service su un sistema che ne sia affetto.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Google Chrome versioni precedenti alla 146.0.7680.71/72 per Windows
Google Chrome versioni precedenti alla 146.0.7680.71/72 per Mac
Google Chrome versioni precedenti alla 146.0.7680.71 per Linux
:: Impatto
Accesso a dati riservati (ID)
Denial of Service (DoS)
Elusione delle restrizoni di sicurezza (SRB)
Esecuzione remota di codice arbitrario (RCE)
Spoofing
:: Soluzioni
Aggiornare alla versione piu' recente.
L'aggiornamento sara' automatico per tutte le installazioni
in cui non sia stata disattivata l'opzione "aggiornamento automatico".
Gli utenti desktop possono verificare la propria versione di Chrome, ed
attivare un aggiornamento, scegliendo dal menu (icona 3 punti verticali) la voce
Guida -> Informazioni su Googlo Chrome
oppure navigando su chrome://settings/help
Per l'installazione manuale scaricare il prodotto dal sito ufficiale:
http://www.google.com/chrome/?hl=it
:: Riferimenti
Google Chrome Releases
https://chromereleases.googleblog.com/2026/03/stable-channel-update-for-desktop_10.html
Mitre CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3913
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3914
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3915
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3916
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3917
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3918
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3919
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3920
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3921
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3923
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3924
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3925
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3926
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3927
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3928
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3929
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3930
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3931
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3932
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3934
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3935
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3936
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3937
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3938
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3939
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3940
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3941
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3942
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iGsEAREIACsWIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCabJ5Dg0cY2VydEBnYXJy
Lml0AAoJEMGcTJNlEmBCgccAn3zzhanbQtnPjFN4YKaGV6O533SFAJ9bZOUKeK7Z
1geu8VaYSnz/C8WY9g==
=aG6Q
-----END PGP SIGNATURE-----