Google this week announced the release of Chrome 113 to the stable channel with 15 security fixes, including patches for 10 vulnerabilities reported by external researchers.
Released roughly two weeks after Google resolved two zero-day vulnerabilities in the popular browser, the latest Chrome update only resolves medium- and low-severity flaws, despite the major version change.
Even if none of the externally reported flaws was severe, however, the internet giant paid over $30,000 in bug bounty rewards to the reporting researchers, its advisory reveals.
The highest reward was handed out for a medium-severity inappropriate implementation flaw in Prompts. Rong Jian earned $7,500 for reporting this issue, which is tracked as CVE-2023-2459.
Four other medium-severity inappropriate implementation bugs also addressed in this browser release were identified in Chrome components such as Prompts, Screen Mode, PictureInPicture, and CORS.
Chrome 113 resolves two other medium-severity bugs, namely an insufficient validation of untrusted input vulnerability in Extensions (awarded a $5,000 bug bounty) and a use-after-free flaw in OS inputs (rewarded with a $4,000 bounty).
The remaining three externally reported issues were low-severity inappropriate implementation vulnerabilities impacting Prompts and PictureInPicture.
The latest browser iteration is now rolling out as Chrome version 113.0.5672.63 for Linux and macOS, and as Chrome versions 113.0.5672.63/.64 for Windows.
Related: CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog
Related: Google Warns of New Chrome Zero-Day Attack
Related: Chrome 112 Patches 16 Security Flaws