PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-9111 Google CVE debrief

CVE-2026-9111 is a browser memory-safety flaw in Chrome’s WebRTC component on Linux. A crafted HTML page could trigger a use-after-free condition and allow remote code execution before version 148.0.7778.179. The supplied Chromium advisory labels the issue Critical, while NVD currently lists a CVSS 3.1 score of 8.8 (HIGH).

Vendor
Google
Product
Chrome
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-21
Advisory published
2026-05-20
Advisory updated
2026-05-21

Who should care

Linux administrators, endpoint security teams, and organizations that rely on Chrome for web access should treat this as a priority browser patch. Any environment that regularly opens untrusted web content is especially relevant.

Technical summary

The official NVD record describes the issue as a use-after-free (CWE-416) in WebRTC affecting Google Chrome on Linux prior to 148.0.7778.179, reachable by a remote attacker through a crafted HTML page. The NVD vector is AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, which indicates network reachability with user interaction required and potential impact to confidentiality, integrity, and availability. The NVD source references Google’s Chrome stable-channel update and the Chromium issue tracker entry associated with the fix.

Defensive priority

High

Recommended defensive actions

  • Update Chrome on Linux to 148.0.7778.179 or later as soon as possible.
  • Confirm auto-update is functioning across managed desktops and build pipelines.
  • Prioritize systems that browse untrusted sites, handle external HTML content, or run high-privilege browser sessions.
  • Review browser isolation, sandboxing, and least-privilege controls for exposed Linux endpoints.
  • Track the linked Chrome release advisory and Chromium issue for any follow-up remediation notes.

Evidence notes

All claims are taken from the supplied NVD record and its official references. The CVE was published in the provided corpus on 2026-05-20T20:16:41.870Z. The source material confirms a Google Chrome/WebRTC issue on Linux, but the vendor attribution metadata in the prompt is weak and should be treated as needing review.

Official resources

Public disclosure appears in the supplied official records on 2026-05-20, with NVD and Google Chrome advisory references available at the same time. No KEV listing or ransomware-campaign attribution is supplied in the corpus. Vendor naming/