Google fixes fourth actively exploited Chrome zero-day of 2026
好的,用户让我总结这篇文章的内容,控制在100字以内,而且不需要特定的开头。我先快速浏览一下文章内容。 文章主要讲的是Google修复了Chrome浏览器的一个零日漏洞,编号是CVE-2026-5281。这个漏洞是在WebGPU的Dawn组件中发现的,已经被黑客利用了。Google已经发布了更新,修复了这个漏洞和其他20个问题。 接下来,我需要提炼关键信息:修复了零日漏洞,编号是什么,影响的组件是什么,漏洞类型是use-after-free,以及这是今年第四个被利用的零日漏洞。 然后我要把这些信息浓缩成大约100字以内的中文描述。确保不遗漏重要细节,比如漏洞已经存在于野外被利用的事实,以及Google呼吁用户立即更新浏览器。 最后检查一下是否符合用户的要求:没有使用特定的开头语句,直接描述内容,并且控制在字数限制内。 </think> Google修复了Chrome浏览器中的第四个零日漏洞CVE-2026-5281,该漏洞存在于WebGPU Dawn组件中,已被黑客利用。这是一个use-after-free内存错误,可能导致攻击者执行恶意代码或控制系统。Google已发布更新修复此漏洞,并敦促用户立即升级至最新版本以降低风险。 2026-4-1 20:41:11 Author: securityaffairs.com(查看原文) 阅读量:17 收藏

Google fixes fourth actively exploited Chrome zero-day of 2026

Google fixed a new Chrome zero-day, tracked as CVE-2026-5281, in the WebGPU Dawn component that is already exploited in the wild.

Google released Chrome updates fixing 21 vulnerabilities, including a new actively exploited zero-day tracked as CVE-2026-5281. The flaw is a use-after-free bug in Dawn, the WebGPU component used for graphics processing.

Due to ongoing exploitation, the company urges users to update their browsers immediately to reduce the risk of attacks.

“Google is aware that an exploit for CVE-2026-5281 exists in the wild.” reads the advisory.

A use-after-free (UAF) bug is a type of memory error where a program continues to use a piece of memory after it has already been freed (released).

Attackers can exploit use-after-free bugs to crash applications, execute malicious code, or take control of a system. Google fixed the Chrome zero-day and urges users to update to version 146.0.7680.177/178 (Windows/macOS) or 146.0.7680.177 (Linux).

As usual, Google did not reveal technical details of the attacks exploiting this flaw or the type of attackers involved, to give users time to update and prevent others from exploiting it.

CVE-2026-5281 is the fourth Chrome zero-day exploited in attacks in 2026, below the other actively exploited flaws addressed by Google this year:

  • February 2026 – CVE-2026-2441 – Use after free in CSS
  • March 2026 – CVE-2026-3909 (CVSS score: 8.8) – Out-of-bounds write in the Skia 2D graphics library and CVE-2026-3910 (CVSS score: 8.8) – Flaw in the implementation of the V8 JavaScript/WebAssembly engine

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Google)




文章来源: https://securityaffairs.com/190265/hacking/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2026.html
如有侵权请联系:admin#unsafe.sh