Chromium’s recent CVE-2026-3924 — a use-after-free in WindowDialog — has been recorded in Microsoft’s Security Update Guide (SUG) because Microsoft Edge (the Chromium‑based browser) ships the Chromium engine and Microsoft uses the SUG to tell Edge customers when downstream Edge builds have ingested the upstream Chromium fix and are therefore no longer vulnerable. This article explains what CVE‑2026‑3924 is, why Microsoft lists Chromium‑assigned CVEs in its Security Update Guide, and — step‑by‑step — how you can check whether your browser already contains the fix. I’ll also walk through enterprise mapping considerations, risks if you’re unpatched, and practical mitigation steps you can use right now.
Chromium is the open‑source browser engine that powers Google Chrome and several other browsers, including Microsoft Edge. When the Chromium project fixes a security defect, Google publishes release notes and a Chrome stable update; downstream vendors such as Microsoft then ingest those fixes into their own builds of Edge and publish their own release notes and SUG entries to mark the fix as available for Edge users. Google’s March 10, 2026 Stable Channel update for Chrome 146 explicitly lists CVE‑2026‑3924 (described as a high‑severity use‑after‑free in WindowDialog) among the security fixes included in Chrome 146.0.7680.71. (chromereleases.googleblog.com) (cvedetails.com)
Microsoft’s Security Update Guide documents CVEs that affect Microsoft products directly, and it also records vendor‑of‑origin CVEs from upstream open‑source projects that Microsoft consumes. The SUG entry for a Chromium CVE is Microsoft’s official way of telling Edge customers: “We have ingested the upstream Chromium fix and shipped an Edge build that is no longer vulnerable.” This downstream status signal is the practical value of seeing a Chrome CVE inside Microsoft’s SUG. Forum discussions and community explanations reflect this same operaoAbout/version” page and compare to the fixed build numbers referenced upstream and in Microsoft’s guidance. (msrc.microsoft.com)
Conclusion: CVE‑2026‑3924 is an upstream Chromium fix that has been made visible to Edge customers through Microsoft’s Security Update Guide so you can confidently confirm whether your installation is patched. Use the browser’s About/version page, compare to the fixed builds listed by Google and Microsoft, and update immediately if you’re on an older build. (chromereleases.googleblog.com) (cvedetails.com) (msrc.microsoft.com)
Source: MSRC Security Update Guide - Microsoft Security Response Center
Background / Overview
Chromium is the open‑source browser engine that powers Google Chrome and several other browsers, including Microsoft Edge. When the Chromium project fixes a security defect, Google publishes release notes and a Chrome stable update; downstream vendors such as Microsoft then ingest those fixes into their own builds of Edge and publish their own release notes and SUG entries to mark the fix as available for Edge users. Google’s March 10, 2026 Stable Channel update for Chrome 146 explicitly lists CVE‑2026‑3924 (described as a high‑severity use‑after‑free in WindowDialog) among the security fixes included in Chrome 146.0.7680.71. (chromereleases.googleblog.com) (cvedetails.com)Microsoft’s Security Update Guide documents CVEs that affect Microsoft products directly, and it also records vendor‑of‑origin CVEs from upstream open‑source projects that Microsoft consumes. The SUG entry for a Chromium CVE is Microsoft’s official way of telling Edge customers: “We have ingested the upstream Chromium fix and shipped an Edge build that is no longer vulnerable.” This downstream status signal is the practical value of seeing a Chrome CVE inside Microsoft’s SUG. Forum discussions and community explanations reflect this same operaoAbout/version” page and compare to the fixed build numbers referenced upstream and in Microsoft’s guidance. (msrc.microsoft.com)
What CVE‑2026‑3924 actually is
The technical short form
- Type: Use‑after‑free (CWE‑416).
- Component: WindowDialog (part of Chromium’s renderer/UI handling).
- Impact: A compromised renderer process (or carefully crafted web content) could leverage the bug to perform a sandbox escape or otherwise elevate impact beyond a renderer crash, according to the Chromium advisory and CVE summaries.
- Severity: High (CVSS 3.x rating reported as 7.5 in public trackers).
- Fixed in: Google Chrome 146.0.7680.71 (stable channel promotion March 10, 2026). (chromereleases.googleblog.com) (cvedetails.com)
What “use‑after‑free” means here
A use‑after‑free bug occurs when program logic continues to access memory that has already been freed. In a complex multi‑process browser architecture, these scenarios can allow a crafted web page to trigger memory corruption that may lead to crashes, data corruption, or — in the worst cases — sandbox escapes and remote code execution. Chromium tracks such defects carefully and assigns CVEs when a vulnerability meets disclosure thresholds; the Chrome 146 release notes explicitly list CVE‑2026‑3924 among other security fixes included in that release. (chromereleases.googleblog.com)Why the CVE appears in Microsoft’s Security Update Guide
The relationship between Chromium, Chrome and Edge
Microsoft Edge (desktop) is built on the Chromium project. That means Edge consumes large swathes of Chromium’s open‑source code (Blink, V8, ANGLE, etc.). When Chromium or Chrome receives a security fix, Microsoft evaluates and ingests that upstream change into Edge — sometimes with additional integration or platform— and then ships an Edge build containing the fix. Documenting Chromium‑assigned CVEs in the Security Update Guide serves two purposes:- It gives Edge administrators and users a clear, authoritative downstream signal that Microsoft has absorbed and shipped the upstream fix.
- It provides the vendor‑of‑origin context (so defenders know where the vulnerability came from and where to find upstream technical details).
How Microsoft uses the SUG entry operationally
A typical flow is:- Google/Chromium fixes a vulnerability and releases Chrome with the fix (Chrome release notes list the CVE and the Chrome build(s) that contain the fix). (chromereleases.googleblog.com)
- Microsoft ingests the upstream change into its Edge development branches, tests and builds a released Edge version that includes the fix. Microsoft then documents the CVE inGuide and — where relevant — in Edge release notes and the Learn/Release Notes pages to tell administrators which Edge build includes the remediation. (msrc.microsoft.com)
- End users and administrators verify their installed browser versions against the fixed upstream or downstream build numbers; if their version is earlier than the fixed one, they update. Community guidance and forum posts mirror these steps and give practical advice for confirming protection.
er version (quick practical steps)
You should always check the installed browser’s version to confirm whether you are on or above the patched build. Different platforms and products have slightly different UIs, but the canonical, fast checks are the same in Chrome and Edge.For Microsoft Edge (desktop: Windows, macOS)
- Open Edge.
- Click the three‑dot menu (Settings and more) in the top right.
- Choose Help and feedback → About Microsoft Edge. The page will display the complete version string and automatically check for updates. Alternatively, you can type edge://version in the address bar to see the detailed version page. (support.microsoft.com)
For Google Chrome (desktop: Windows, macOS)
- Open Chrome.
- Click the three‑dot menu → Help → About Google Chrome. Chrome will display the version and also trigger an automatic update check where applicable. You can also type chrome://version to show a detailed version string. (chromereleases.googleblog.com)
For mobile browsers
- Use the platform‑store listing (Google Play / Apple App Store) and check the app’s version; mobile rollout timing can differ from desktop. Confirm the version number in the app store entry and compare to the fixed build numbers provided by the vendor release notes. Community threads emphasize that mobile rollouts may lag and that app store metadata is the best authoritative source for mobile versions.
Mapping the fixed versions: what to compare
Key facts you should confirm before concluding you are protected:- Chrome’s fixed build: Chrome 146.0.7680.71 (stable) contains the CVE‑2026‑3924 fix according to Chrome release notes. If your Chrome version is earlier than 146.0.7680.71, it is likely vulnerable. (chromereleases.googleblog.com)
- Edge mapping: Microsoft publishes which Edge builds have “incorporated the latest Security Updates of the Chromium project” in its release notes and the Security Update Guide. The SUG entry is the downstream confirmation that Edge builds with a particular version are no longer vulnerable. Check Microsoft’s Edge release notes or the SUG entry to find the precise Edge build number that carries the Chromium 146 fixes. (msrc.microsoft.com)
- Independent trackers (NVD / CVE aggregators) will also show the upstream fixed Chrome version; cross‑checking two independent sources (Google’s Chrome Releases blog and a CVE tracker) is a good practice. (cvedetails.com)
Step‑by‑step: Confirm protection on your machine
- Open your browser and go to About (Edge: Help and feedback → About Microsoft Edge; Chrome: Help → About Google Chrome). Note the full version string.
- Compare the version string with the vendor’s fixed build number(s): Chrome’s advisory lists fixed versions (for CVE‑2026‑3924, Chrome 146.0.7680.71), and Microsoft’s SUG or Edge release notes show when Edge has ingested the Chromium fix. If your installed build is equal to or newer than the fixed build, your browser should contain the fix. (chromereleases.googleblog.com) (msrc.microsoft.com)
- If your version is older, update the browser immediately. Both browsers have built‑in auto update check in their About pages; you may need to relaunch the browser to complete the update. (chromereleases.googleblog.com)
- For managed/enterprise environments: check your enterprise update channels (Stable, Extended Stable) and consult Microsoft’s release notes for the Edge channel you use to find the exact build that contains the ingestion of Chromium 146 security updates. Microsoft documents which chlude Chromium fixes.
Enterprise considerations and mapping pitfalls
Channel and cadence mismatches
Enterprise deployments commonly use Edge channels such as Stable, Beta, Dev, and Extended Stable. Chromium fixes reach Google’s Chrome stable channel first and then are ingested into Edge builds on Microsoft’s cadence. That can create mapping and timing confusion:- Chrome 146 may be released to Google’s stable channel on day X; Microsoft may take additional days to test and release an Edge build that includes Chromium 146 fixes for each Edge channel.
- Extended Stable and Long‑Term channels may receive fixes on a different schedule. Always check Microsoft’s Edge release notes for the channel you manage. (chromereleases.googleblog.com)
How to map Chrome build numbers to Edge builds
Microsoft’s release notes and the SUG are the authoritative downstream mapping. Do not assume that “Chrome 146.0.7680.71 = Edge version X” without confirming in Microsoft’s published release notes, because Microsoft may apply platform‑specific patches or packaging differences. Use these resources:- Microsoft Security Update Guide entry for the CVE (shows ingestion status for Edge). (msrc.microsoft.com)
- Microsoft Edge release notes (Microsoft Learn) which explicitly state “this Edge build includes the latest Chromium security updates.”
Risks if you remain unpatched
If your browser version is older than the patched build:- You are exposed to memory‑corruption attacks triggered by malicious web content. For use‑after‑free defects, attackers may exploit crafted HTML/JS to crash the browser or, in some situations, to escape the renderer sandbox and achieve higher privilege code execution.
- Exploitation complexity varies; CVE‑2026‑3924 has a “High” severity rating and an attack complexity flagged as non‑trivial in public records, but public exploit evidence and exploitation‑in‑the‑wild reports can change quickly. Always treat unpatched high‑severity CVEs as actionable risk. (cvedetails.com)
Mitigation and immediate actions
- Update now: Use the browser’s About page to trigger an update check, or deploy the vendor’s official update package via your management tooling (SCCM/Intune, JAMF, other MDM/patch tools). Restart the browser after updating. (chromereleases.googleblog.com)
- For managed fleets: aat Microsoft lists as containing the Chromium 146 updates; check the SUG entry for the CVE and Microsoft’s Edge release notes for the channel you use. (msrc.microsoft.com)
- If you cannot update immediately: enforce web content restrictions (block risky sit Security Policy on internal web apps), disable potentially unused features (where feasible), and ensure other browser hardening controls (site isolation, extensions policies) are applied. These are stopgaps — not substitutes for updating.
- Monitor: Watch vendor advisories and threat intelligence feeds for any signs of exploitation in the wild, and be prepared to accelerate patching if exploitation is observedttps://www.cvedetails.com/cve/CVE-2026-3924/))
A note on verification and trusted sources
To be certain about your protection status, cross‑reference at least two authoritative sources:- Google’s Chrome Releases blog details which Chrome builds include the fix (Chrome 146.0.7680.71 for CVE‑2026‑3924). (chromereleases.googleblog.com)
- Microsoft’s Security Update Guide and Edge release notes report the downstream ingestion status for Edge and which Edge build contains the fix. Use the SUG entry to confirm Microsoft’s official downstream status. (msrc.microsoft.com)
- Public CVE aggregators (NVD, CVE Details, others) will list CVE metadata and fixed upstream versions; these are useful secondary checks to verify vendor statements. (cvedetails.com)
How to interpret SUG entries when a CVE is upstream
When you view a Chromium CVE in Microsoft’s Security Update Guide, read the entry as an operational status indicator:- If the SUG entry marks an Edge product as vulnerable, Microsoft has not yet shipped the ingestion in a released Edge build for that product/channel.
- If the SUG entry shows a remediation or references a fixed Edge build, that means Microsoft has shipped an Edge build that contains the upstream fix and the product is no longer vulnerable once you’re on that build. SUG entries also include vendor‑of‑origin information so administrators can consult upstream advisories for technical detail. (msrc.microsoft.com)
Practical FAQ (common quick answers)
- Q: “Why is a Chrome CVE in Microsoft’s Security Update Guide?”
A: Because Micrhromium OSS; the SUG documents the CVE to show whether downstream Edge builds have ingested the upstream fix. (msrc.microsoft.com) - Q: “How do I check if my Edge/Chrome is vulnerable to CVE‑2026‑3924?”
A: Open About in your browser (Edge: Help and feedback → About Microsoft Edge or edge://version; Chrome: About Google Chrome or chrome://version) and compare your version to the patched build (Chrome 146.0.7680.71). For Edge, consult the SUG/Edge release notes to see which Edge build contains the Chromium ingestion. (chromereleases.googleblog.com) (msrc.microsoft.com) - Q: “What if my organization blocks automatic updates?”
A: Use your management tooling to deploy the patched Edge/Chrome build, test on representative devices, and roll the update across your fleet. If you cannot update quickly, apply compensating controls (restrict web usage, strengthen filter policies) and prioritize devices with the highest exposure.
Final assessment and recommended next steps
CVE‑2026‑3924 is a high‑severity use‑after‑free defect fixed in Chrome 146. Because Edge is Chromium‑based, Microsoft documents the upstream CVE in its Security Update Guide to communicate downstream ingestion status for Edge customers. The operational takeaway is straightforward and urgent for defenders:- Check your browser’s About/version page now. If you are on Chrome older than 146.0.7680.71 or on an Edge build that has not yet ingested the Chromium 146 fixes, update immediately. (chromereleases.googleblog.com) (msrc.microsoft.com)
- For enterprises, validate the Edge channel mapping against Microsoft’s Edge release notes and the SUG entry, then schedule or push the required update through your management platform.
- If you need to demonstrate remediation, capture the browser About/version output and the corresponding vendor release note (Chrome release line or Microsoft SUG/Edge release‑note entry) that shows the fixed build for audit evidence. (chromereleases.googleblog.com) (msrc.microsoft.com)
Conclusion: CVE‑2026‑3924 is an upstream Chromium fix that has been made visible to Edge customers through Microsoft’s Security Update Guide so you can confidently confirm whether your installation is patched. Use the browser’s About/version page, compare to the fixed builds listed by Google and Microsoft, and update immediately if you’re on an older build. (chromereleases.googleblog.com) (cvedetails.com) (msrc.microsoft.com)
Source: MSRC Security Update Guide - Microsoft Security Response Center