Researchers from Chinese cybersecurity company Qihoo 360 have earned another $20,000 from Google for a sandbox escape vulnerability affecting the Chrome web browser.
Google informed Chrome users on Tuesday that an update for version 89 includes eight security fixes, including for six vulnerabilities reported by external researchers.
The highest reward, $20,000, was awarded to researchers Leecraso and Guang Gong of the 360 Alpha Lab at Qihoo 360. The issue was described by Google as a use-after-free in screen capture.
Leecraso told SecurityWeek that the vulnerability, tracked as CVE-2021-21194, can be exploited to escape the Chrome sandbox. If exploited in combination with a renderer bug, it can allow an attacker to remotely execute arbitrary code outside the Chrome sandbox on the targeted user’s device.
This is not the first time Leecraso and Guang Gong have found such a vulnerability in Chrome. In fact, over the past year, 360 Alpha Lab researchers Rong Jian, Leecraso and Guang Gong have received more than $150,000 for security holes discovered in Chrome, and there still appear to be several critical and high-severity vulnerabilities for which Google has yet to determine the bug bounty.
These researchers have been named in at least 17 Chrome advisories over the past year.
The latest Chrome update also patches several other high-severity vulnerabilities, including a use-after-free in the V8 JavaScript engine, two heap buffer overflows in TabStrip, an out-of-bounds read bug affecting IPC, and a use-after-free in Aura.
Google reported last month that it paid out a total of $6.7 million in bug bounties in 2020, and roughly $28 million since its first bug bounty program was launched ten years ago.
Related: Google Awards $40,000 for Chrome Sandbox Escape Vulnerabilities
Related: Chrome Update Patches Actively Exploited FreeType Vulnerability
Related: Chrome 89 Patches Actively Exploited Vulnerability
Related: Microsoft Patches Windows Vulnerability Chained in Attacks With Chrome Bug

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
Latest News
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
