HN
Today

Zero-day CSS: CVE-2026-2441 exists in the wild

Google Chrome has released an urgent stable channel update to address CVE-2026-2441, a critical 'use after free' vulnerability in its CSS engine. This patch is paramount as Google confirms active exploits for this zero-day flaw are already circulating in the wild. The story is popular on HN due to its immediate security implications for millions of users and the ongoing battle against software vulnerabilities.

3
Score
0
Comments
#3
Highest Rank
7h
on Front Page
First Seen
Feb 18, 4:00 PM
Last Seen
Feb 18, 10:00 PM
Rank Over Time
9348354

The Lowdown

Google Chrome has rolled out an immediate stable channel update across desktop platforms (Windows, Mac, and Linux) to address a critical security vulnerability. The update aims to patch CVE-2026-2441, a high-severity "use after free" bug within its CSS rendering engine, which is particularly concerning given that exploits for this flaw are known to exist in the wild.

  • The update brings Chrome to version 145.0.7632.75/76 for Windows/Mac and 144.0.7559.75 for Linux.
  • The primary fix is for CVE-2026-2441, identified as a "High" severity "Use after free in CSS."
  • This vulnerability was reported by Shaheen Fazim on February 11, 2026.
  • Crucially, Google has confirmed that an exploit for CVE-2026-2441 is actively being used in real-world scenarios.
  • The announcement also highlights Google's use of various sanitizers and fuzzing tools like AddressSanitizer, MemorySanitizer, libFuzzer, and AFL in their ongoing security efforts.

Users are strongly advised to update their Chrome browsers to the latest stable version without delay to protect against this actively exploited zero-day threat. Google continues its commitment to security through rapid patching and advanced bug detection methods.