Google this week announced the release of a Chrome browser update that resolves a total of 13 vulnerabilities, including nine that were reported by external researchers.
Of the externally reported security holes, seven are use-after-free bugs – these types of vulnerabilities could lead to arbitrary code execution.
Based on severity ratings and the currently listed bug bounties, the most important of these flaws is CVE-2022-1633, a high-severity use-after-free in Sharesheet that was reported by Khalil Zhani, who was awarded a $5,000 reward for the find.
The same researcher reported CVE-2022-1634, a high-severity use-after-free in Browser UI, for which he was awarded $3,000.
CVE-2022-1635, a high-severity use-after-free in Permission Prompts, which was reported by an anonymous researcher, also qualified for a $3,000 bug bounty payout.
As per Google’s policies, however, CVE-2022-1636, a high-severity use-after-free in Performance APIs, reported by Microsoft’s Seth Brenith, is not eligible for a reward.
Google notes in its advisory that it has yet to determine the bug bounties to be handed out for four other high-severity vulnerabilities resolved with this Chrome update.
These include CVE-2022-1637 (inappropriate implementation in Web Contents), CVE-2022-1638 (Heap buffer overflow in V8 Internationalization), CVE-2022-1639 (use-after-free in ANGLE), and CVE-2022-1640 (use-after-free in Sharing).
The ninth vulnerability resolved with this browser update and the seventh use-after-free in the batch is rated “medium severity.” Tracked as CVE-2022-1641, the bug was awarded a $5,000 bounty reward, Google says.
The latest Chrome iteration is now rolling out to Windows, Mac and Linux users as version 101.0.4951.64. Google made no mention of any of these vulnerabilities being exploited in attacks.