Google has released Chrome versions 144.0.7559.96 and 144.0.7559.97 for Windows, macOS, and Linux, addressing a critical security flaw in the V8 JavaScript engine.
The update, which began rolling out on January 20, 2026, patches CVE-2026-1220, a race condition vulnerability that could allow attackers to exploit the browser’s core rendering engine.
The security flaw, designated CVE-2026-1220, is a high-severity race condition in V8, Chrome’s JavaScript engine that executes web code.
Race conditions occur when multiple processes access shared resources simultaneously without proper synchronization, potentially allowing attackers to manipulate memory state and execute arbitrary code.
The vulnerability was independently discovered and reported by security researcher @p1nky4745 on January 7, 2026.
The race condition vulnerability in V8 poses significant risks to users worldwide. Attackers could craft malicious websites that, when visited in vulnerable Chrome instances, exploit this flaw to gain unauthorized code execution within the browser’s sandbox.
This could lead to credential theft, malware installation, or unauthorized access to sensitive user data.
Given V8’s widespread use across multiple platforms and applications, the vulnerability’s remediation was prioritized by Google’s security team.
Google is gradually rolling out Chrome 144 to its user base to prevent service disruptions. Windows and macOS users receive version 144.0.7559.96 or 144.0.7559.97, while Linux users receive 144.0.7559.96.
The phased deployment approach ensures stability while allowing Google to monitor for any unexpected issues during the update process. Users can manually check for updates through Chrome’s settings menu under “About Google Chrome.”
The vulnerability was identified using Google’s advanced security testing infrastructure, including the AddressSanitizer, MemorySanitizer, and UndefinedBehaviorSanitizer tools, which detect memory safety issues and undefined behavior in code.
This multi-layered approach demonstrates Google’s commitment to preventing security flaws from reaching users.
Users are strongly advised to update Chrome as soon as it becomes available in their region. Organizations managing multiple Chrome installations should prioritize deploying version 144 or later.
Bug details remain restricted until a majority of users complete the update, preventing potential exploitation.
Users experiencing issues after updating can report problems through Chrome’s official bug reporting system or community help forums.Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
Exclusive Cyber Security News platform that provide in-depth analysis about Cyber Attacks, Malware infection, Data breaches, Vulnerabilities, New researches & other Cyber stories.
Contact Us: cyber.press@outlook.com
© Copyright 2024 – Cyber Press


