Alert GCSA-26057 - Aggiornamento di sicurezza per Google Chrome

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ****************************************************************** Alert ID: GCSA-26057 Data: 09 Aprile 2026 Titolo: Aggiornamento di sicurezza per Google Chrome ****************************************************************** :: Descrizione del problema Sono state identificate vulnerabilita' multiple in Google Chrome, che potrebbero essere sfruttate da un attaccante remoto per eseguire codice arbitrario, innescare condizioni di Denial of Service, oltrepassare restrizioni di sicurezza, manipolare dati e rivelare informazioni sensibili su un sistema che ne sia affetto. Maggiori informazioni sono disponibili alla sezione "Riferimenti". :: Software interessato Google Chrome versioni precedenti alla 147.0.7727.55/56 per Mac e Windows Google Chrome versioni precedenti alla 147.0.7727.55 per Linux :: Impatto Information Disclosure Denial of Service Remote Code Execution Security Restriction Bypass Data Manipulation :: Soluzioni Aggiornare alla versione piu' recente. L'aggiornamento sara' automatico per tutte le installazioni in cui non sia stata disattivata l'opzione "aggiornamento automatico". Gli utenti desktop possono verificare l'avvenuto aggiornamento scegliendo dal menu (icona 3 punti verticali) la voce Guida -> Informazioni su Google Chrome. Per l'installazione manuale scaricare il software dal sito ufficiale: http://www.google.com/chrome/?hl=it :: Riferimenti Google Chrome Releases https://chromereleases.googleblog.com/2026/04/stable-channel-update-for-desktop.html Mitre CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5858 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5859 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5860 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5861 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5862 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5863 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5864 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5865 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5866 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5867 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5868 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5869 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5870 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5871 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5872 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5873 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5874 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5875 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5876 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5877 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5878 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5879 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5880 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5881 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5882 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5883 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5884 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5885 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5886 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5887 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5888 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5889 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5890 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5891 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5892 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5893 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5894 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5895 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5896 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5897 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5898 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5900 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5901 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5902 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5903 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5904 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5905 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5906 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5907 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5908 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5909 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5910 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5911 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5912 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5913 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5914 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5915 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5918 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5919 GARR CERT Security Alert - subscribe/unsubscribe: http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert -----BEGIN PGP SIGNATURE----- iF0EAREIAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaddUJwAKCRDBnEyTZRJg QpsSAKCK94LVElDhpNpIogRKZS3XsFJXMACg2nAPKiyjEkJ/V4d2nT+8r/ClmnM= =Zd7S -----END PGP SIGNATURE-----