Google on Tuesday announced the stable channel release of Chrome 102, which patches 32 vulnerabilities, including a critical flaw reported by an anonymous researcher.
The critical security hole, tracked as CVE-2022-1853, has been described as a use-after-free bug affecting Indexed DB. Google learned about it on May 12 and it has yet to determine the bug bounty for this vulnerability.
Chrome 102 also addresses eight high-severity vulnerabilities reported by external researchers. Based on the rewards announced so far — the bug bounty is still being determined for some issues — the most serious of them is CVE-2022-1854, a use-after-free affecting the ANGLE component of the web browser. Researcher SeongHwan Park received $10,000 for reporting the weakness to Google.
Use-after-free vulnerabilities can typically be exploited for data corruption, DoS attacks or arbitrary code execution. In the case of Chrome, these types of bugs could also allow an attacker to escape the browser’s sandbox, but they might need to be combined with another vulnerability.
The list of high-severity vulnerabilities patched in the latest Chrome release also includes CVE-2022-1855, a use-after-free in Messaging that earned a researcher $7,500, and CVE-2022-1856, a use-after-free in User Education that Google rewarded with $3,000.
Fifteen of the vulnerabilities reported by external researchers were assigned a severity rating of “medium” or “low.” However, it’s worth noting that three of the medium-severity issues earned $5,000 rewards, and one low-severity flaw received a $7,000 reward.
While there is no indication that these vulnerabilities have been exploited in malicious attacks, it’s important that users keep the browser updated since it’s not uncommon for threat actors to target it in their operations.
Google is aware of three Chrome vulnerabilities that have been exploited in attacks so far this year.
In March, the tech giant confirmed seeing a surge in Chrome zero-day exploitation, with 14 vulnerabilities exploited in 2021. The company blamed this trend on several factors, including Chrome’s popularity, increased transparency, the need to chain multiple flaws for a single exploit, and the browser becoming more complex.
Related: Chrome 101 Patches 30 Vulnerabilities
Related: Google Issues Emergency Fix for Chrome Zero-Day
Related: Google Discovers Attack Exploiting Chrome Zero-Day Vulnerability

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
- Apple Patches Exploited iOS Vulnerability in Old iPhones
- FBI Confirms North Korean Hackers Behind $100 Million Horizon Bridge Heist
Latest News
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
- Tenable Launches $25 Million Early-Stage Venture Fund
- 820k Impacted by Data Breach at Zacks Investment Research
- Mapping Threat Intelligence to the NIST Compliance Framework Part 2
- Hive Ransomware Operation Shut Down by Law Enforcement
- US Government Agencies Warn of Malicious Use of Remote Management Software
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
