CVE-2026-3061: Out of bounds read in Media in Google Chrome (26-02-2026)

Preface: In the computer industry, the term “sustainability” encompasses design flaws and their remedies. If someone tells you that their hardware and software products have never been found to have any vulnerabilities to date, their design is likely perfect. However, they still need to maintain its sustainability.

Background: In Google Chrome, “Media” refers to the suite of features and APIs used to handle, control, and debug audio, video, and images. Here is the translated breakdown of what it encompasses and how to customize it.

What is “Media” in Chrome?

  1. Global Media Control (Media Hub):
    Located in the top-right corner (a music note icon), this hub allows you to play, pause, or skip tracks across all open tabs without switching to the specific page.
  2. DevTools Media Panel:
    A hidden tool for developers (found via F12 > Three Dots > More tools > Media) used to inspect video resolution, codecs (like AV1), and playback errors in real-time.
  3. Built-in Media Player:
    Chrome acts as a standalone player. You can drag and drop MP4, MP3, JPG, or PDF files directly into a tab to view them.
  4. Casting:
    Integrated support for Google Cast, allowing you to send audio or video from a tab to a TV or Nest speaker. 

Media in Google Chrome contains Global Media Control, DevTools Media Panel, Built-in Media Player and Casting.

Vulnerability details: Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)

Official announcement: Please refer to the link for details – https://nvd.nist.gov/vuln/detail/CVE-2026-3061

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.