Source: BleepingComputer
Author: Sergiu Gatlan
URL: https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/
ONE SENTENCE SUMMARY:
Google issued urgent Chrome stable updates for actively exploited CVE-2026-2441, a CSS font feature use-after-free, backported and partially fixed.
MAIN POINTS:
- Emergency Chrome patches address a high-severity vulnerability exploited as a zero-day.
- Google confirmed in-the-wild exploitation of CVE-2026-2441 via a Friday advisory.
- Root cause involves use-after-free from iterator invalidation in CSSFontFeatureValuesMap.
- Researcher Shaheen Fazim reported the flaw per Chromium commit history.
- Exploitation may cause crashes, rendering issues, data corruption, or undefined behavior.
- Commit notes fix is immediate, with remaining work tracked under bug 483936078.
- Cherry-picked/backported commits indicate urgency for stable release inclusion.
- Incident details were withheld to protect users until updates broadly deploy.
- Stable Desktop rollout targets Windows, macOS 145.0.7632.75/76, and Linux 144.0.7559.75.
- Previous year saw eight Chrome zero-days exploited, many reported by Google’s Threat Analysis Group.
TAKEAWAYS:
- Update Chrome promptly to mitigate active exploitation of CVE-2026-2441.
- Use-after-free bugs in browser rendering components can lead to broad, unpredictable impacts.
- Backported patches often signal real-world attacker use and elevated risk.
- Limited public disclosure is common until most users have received fixes.
- Ongoing tracking bugs suggest follow-on patches or hardening may still be required.