Google Pays $45,000 for High-Severity Vulnerabilities Found in Chrome


Google this week announced the release of a Chrome 107 update that resolves 10 vulnerabilities, including six high-severity bugs reported by external researchers.

Google this week announced the release of a Chrome 107 update that resolves 10 vulnerabilities, including six high-severity bugs reported by external researchers.

Four of the externally reported security defects are use-after-free issues for which Google paid a total of $45,000 in bug bounty rewards to the reporting researchers.

Based on the received reward, $21,000, the most severe of these flaws is CVE-2022-3885, a use-after-free in the V8 open source JavaScript and WebAssembly engine.

Next in line is CVE-2022-3886, a vulnerability in Chrome’s speech recognition component, for which a researcher received a $10,000 bug bounty reward.

Google also patched use-after-free vulnerabilities impacting Chrome’s Web Workers and WebCodecs components and says it has paid $7,000 for each of these issues.

The two remaining Chrome 107 high-severity vulnerabilities that were reported externally include CVE-2022-3889, a type confusion in the V8 engine, and CVE-2022-3890, a heap buffer overflow in Crashpad.

Google says it has yet to determine the bug bounty amounts to be paid for the last two vulnerabilities, meaning that the total handed out to the reporting researchers might be higher than $45,000.

The internet giant makes no mention of any of these vulnerabilities being exploited in attacks.

The latest Chrome iteration is now rolling out to macOS and Linux users as version 107.0.5304.110, and to Windows users as version 107.0.5304.106/.107.

Roughly two weeks ago, Google released an emergency update to patch an actively exploited zero-day in Chrome 107.


By Ionut Arghire on Wed, 09 Nov 2022 14:04:41 +0000
Original link