Google Releases Chrome 144, Fixing 10 V8 Engine Vulnerabilities


Google has launched Chrome 144 for desktop platforms, addressing ten security vulnerabilities including multiple high-severity flaws in the V8 JavaScript engine.

The stable channel update began rolling out on January 13, 2026, for Windows, Mac, and Linux systems.

Chrome 144.0.7559.59 (Linux) and 144.0.7559.59/60 (Windows/Mac) deliver security improvements alongside performance enhancements.

The update follows Google’s standard release cycle, with deployment occurring gradually over the coming days and weeks to ensure stable distribution across the user base.

Critical V8 Engine Patches

The release targets fundamental vulnerabilities in Chrome’s JavaScript processing capabilities.

Security researchers identified multiple out-of-bounds memory access and inappropriate implementation issues in the V8 engine that could enable arbitrary code execution or sandbox escapes.

Google awarded $8,000 to @p1nky4745 for discovering CVE-2026-0899, a high-severity out-of-bounds memory access flaw reported in November 2025.

The update resolves vulnerabilities across multiple components including Blink rendering engine, download handling, digital credentials, network policies, and UI security implementations.

Four vulnerabilities received “High” severity ratings, four were classified as “Medium,” and two as “Low” risk. External researchers received bug bounty rewards ranging from $500 to $8,000 for their contributions.

CVE IDSeverityComponentDescriptionReporterDateReward
CVE-2026-0899HighV8Out of bounds memory access@p1nky47452025-11-08$8,000
CVE-2026-0900HighV8Inappropriate implementationGoogle2025-12-03TBD
CVE-2026-0901HighBlinkInappropriate implementationIrvan Kurniawan (sourc7)2021-10-04TBD
CVE-2026-0902MediumV8Inappropriate implementation303f06e32025-12-16$4,000
CVE-2026-0903MediumDownloadsInsufficient validation of untrusted inputAzur2025-09-13$3,000
CVE-2026-0904MediumDigital CredentialsIncorrect security UIHafiizh2025-10-15$1,000
CVE-2026-0905MediumNetworkInsufficient policy enforcementGoogle2025-12-02TBD
CVE-2026-0906LowUIIncorrect security UIKhalil Zhani2025-12-10$2,000
CVE-2026-0907LowSplit ViewIncorrect security UIHafiizh2025-09-12$500
CVE-2026-0908LowANGLEUse after freeGlitchers BoB 14th.2025-10-15TBD

Google acknowledged the security research community’s contributions and noted that many vulnerabilities are detected using automated tools including AddressSanitizer, MemorySanitizer, UndefinedBehaviorSanitizer, Control Flow Integrity, libFuzzer, and AFL.

Users can update through Chrome’s built-in update mechanism or download the latest version from the official Chrome website.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link