EXECUTIVE SUMMARY:
A high‑severity race condition vulnerability has been patched CVE-2026-1220 in the Google Chrome 144 Stable channel update, addressing a flaw in the V8 JavaScript and WebAssembly engine that could lead to memory corruption and potentially allow attackers to crash the browser or achieve arbitrary code execution if exploited via crafted web content. The vulnerability, rooted in unexpected concurrent operations within V8s internal execution, poses a significant risk to systems with unpatched versions of Chrome; because details are being withheld until a majority of users are updated, adversaries may attempt to reverse‑engineer the fix and weaponize the defect against vulnerable targets. Users and administrators are strongly advised to update to the latest Chrome release and ensure browsers are restarted so the patch is applied, reducing the exposure window to this and similar engine‑level threats. The vulnerability has a CVSS score of 8.1.