379 points · 220 comments · 1 month ago · idoxer
chromereleases.googleblog.commpeg
cosmic_cheese
Given the staggering importance of the projects they should really have a full-time, well-staffed, well-funded, dedicated team combing through every line, hunting these things down, and fixing them before they have a chance to be used. It'd be a better use of resources than smart fridge integration or whatever other bells and whistles Google has most recently decided to tack onto Chrome.
tripplyons
kykat
This is the "impact" section on https://github.com/huseyinstif/CVE-2026-2441-PoC:
Arbitrary code execution within the renderer process sandbox Information disclosure — leak V8 heap pointers (ASLR bypass), read renderer memory contents Credential theft — read document.cookie, localStorage, sessionStorage, form input values Session hijacking — steal session tokens, exfiltrate via fetch() / WebSocket / sendBeacon() DOM manipulation — inject phishing forms, modify page content Keylogging — capture all keystrokes via addEventListener('keydown')
himata4113
I get that css has changed a lot over the years with variables, scopes and adopting things from less/sass/coffee, but people use no-script for the reason because javascript is risky, but what if css can be just as risky... time to also have no-style?
Honestly, pretty excited for the full report since it's either stupid as hell or a multi-step attack chain.
superkuh
https://issues.chromium.org/issues/483569511 - [TBD][483569511] High CVE-2026-2441: Use after free in CSS. Reported by Shaheen Fazim on 2026-02-11
Access is denied to this issue. Access to this issue may be resolved by signing in.
MallocVoidstar
ripbozo
kingforaday
Interesting they are listing archived projects and not OSS-Fuzz. What's the reason for this?
hussainsumon018
bitbasher
[deleted]
[deleted]
agentifysh
also this seems chromium only so it doesnt impact firefox ?
astrobe_
RyanShook
jijji
fulafel
baq
That's pretty bad! I wonder what kind of bounty went to the researcher.