Google patches first Chrome zero-day exploited in attacks this year
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,抓住主要信息。 文章讲的是Google修复了一个严重的Chrome漏洞,这个漏洞被用于零日攻击。这是今年第一个被修复的此类漏洞。漏洞类型是use-after-free,由安全研究员Shaheen Fazim发现。成功利用这个漏洞可能导致浏览器崩溃、数据损坏等问题。 Google已经发布了紧急更新,并且提到了这是一个临时修复,还有后续工作需要完成。此外,他们没有透露更多关于攻击的细节,只提到已经有证据显示漏洞被利用。 总结的时候,我需要包括以下几点:Google修复了严重漏洞、零日攻击、漏洞类型、影响以及修复情况。同时要保持简洁,不超过100字。 可能的结构是:Google修复了Chrome的严重漏洞(CVE-2026-2441),该漏洞被用于零日攻击。这是一个use-after-free漏洞,可能导致浏览器崩溃等问题。修复已发布,但可能为临时措施。 检查一下字数是否合适,并确保信息准确无误。 </think> Google修复了Chrome中的一个严重零日漏洞(CVE-2026-2441),该漏洞可能导致浏览器崩溃或数据损坏。这是今年首个被修复的此类安全问题。 2026-2-16 08:30:19 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Google Chrome

Google has released emergency updates to fix a high-severity Chrome vulnerability exploited in zero-day attacks, marking the first such security flaw patched since the start of the year.

"Google is aware that an exploit for CVE-2026-2441 exists in the wild," Google said in a security advisory issued on Friday.

According to the Chromium commit history, this use-after-free vulnerability (reported by security researcher Shaheen Fazim) is due to an iterator invalidation bug in CSSFontFeatureValuesMap, Chrome's implementation of CSS font feature values. Successful exploitation can allow attackers to trigger browser crashes, rendering issues, data corruption, or other undefined behavior.

Wiz

The commit message also notes that the CVE-2026-2441 patch addresses "the immediate problem" but indicates there's "remaining work" tracked in bug 483936078, suggesting this might be a temporary fix or that related issues still need to be addressed.

The patch was tagged as "cherry-picked" (or backported) across multiple commits, indicating that it was important enough to include in a stable release rather than waiting for the next major version (likely because the vulnerability is being exploited in the wild).

Although Google found evidence of attackers exploiting this zero-day flaw in the wild, it did not share additional details regarding these incidents.

"Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven't yet fixed," it noted.

Chrome 145.0.7632.76

Google has now fixed this vulnerability for users in the Stable Desktop channel, with new versions rolling out to Windows, macOS (145.0.7632.75/76), and Linux users (144.0.7559.75) worldwide over the coming days or weeks.

If you don't want to update manually, you can also let Chrome check for updates automatically and install them after the next launch.

While this is the first actively exploited Chrome security vulnerability patched since the start of 2026, last year Google addressed a total of eight zero-days abused in the wild, many of them reported by the company's Threat Analysis Group (TAG), widely known for tracking and identifying zero-days exploited in spyware attacks targeting high-risk individuals.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/google-patches-first-chrome-zero-day-exploited-in-attacks-this-year/
如有侵权请联系:admin#unsafe.sh