Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
TCLBANKER Malware Spreads Via WhatsApp Targets Users
May 9, 2026
NVIDIA Data Breach Exposes GeForce Users Reportedly Personal
May 9, 2026
Critical Microsoft 365 Copilot Flaws Ex Vulnerabilities Expose
May 9, 2026
Home/CyberSecurity News/Chrome 144 Released With Fix for 10 Vulnerabilities in V8 Engine
CyberSecurity News

Chrome 144 Released With Fix for 10 Vulnerabilities in V8 Engine

Google has rolled out Chrome 144 to the stable channel across Windows, Mac, and Linux. This release addresses 10 security vulnerabilities, with a primary focus on the V8 JavaScript engine. The...

Sarah simpson
Sarah simpson
January 14, 2026 2 Min Read
2 0

Google has rolled out Chrome 144 to the stable channel across Windows, Mac, and Linux. This release addresses 10 security vulnerabilities, with a primary focus on the V8 JavaScript engine.

The rollout is scheduled to reach users progressively over the coming days and weeks.

Critical Security Patches for V8 Engine

Chrome version 144.0.7559.59 for Linux and 144.0.7559.59/60 for Windows and Mac brings multiple security improvements, with six of the ten fixed vulnerabilities directly affecting the V8 JavaScript engine.

The most severe issue, CVE-2026-0899, involves an out-of-bounds memory access vulnerability in the V8 engine.

This high-severity flaw could allow attackers to access memory outside allocated boundaries, leading to information disclosure or system compromise.

CVE ID Severity Component Vulnerability Type
CVE-2026-0899 High V8 Out of bounds memory access
CVE-2026-0900 High V8 Inappropriate implementation
CVE-2026-0901 High Blink Inappropriate implementation
CVE-2026-0902 Medium V8 Inappropriate implementation
CVE-2026-0903 Medium Downloads Insufficient validation
CVE-2026-0904 Medium Digital Credentials Incorrect security UI
CVE-2026-0905 Medium Network Insufficient policy enforcement
CVE-2026-0906 Low Security UI Incorrect security UI
CVE-2026-0907 Low Split View Incorrect security UI
CVE-2026-0908 Low ANGLE Use after free

Additional V8-related fixes include CVE-2026-0900 and CVE-2026-0902, both of which address improper implementations that could be exploited by malicious actors.

Beyond V8 engine fixes, Chrome 144 addresses vulnerabilities across multiple browser components.

CVE-2026-0901 resolves an inappropriate implementation in Blink, the rendering engine responsible for displaying web content.

The update also addresses security issues in the Digital Credentials and Split View features, with researcher Hafiizh receiving rewards totaling $1,500 for identifying these flaws.

A medium-severity vulnerability in Downloads (CVE-2026-0903) affecting input validation was fixed, along with network policy enforcement issues.

Google credited external security researchers with discovering eight of the ten vulnerabilities and paid out over $18,500 in bug bounty rewards.

Users should update their Chrome browsers immediately to benefit from these security enhancements.

The browser typically updates automatically, but users can manually check for updates by navigating to Settings > About Chrome.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Top 10 Network Security for Education Sectors in Best Providers

Next Post

Magecart Attack Steals Credit Cards from Website Customers Checkout

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
PamDOORa Backdoor Attacks Linux, Attacking Systems
May 8, 2026
Škoda Online Shop Security Incident Exposes Customers Data
May 8, 2026
Hackers Steal Crypto & Passwords via Fake OpenClaw Installer
May 8, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us