Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Chrome 113 Released With 15 Security Patches

Chrome 113 was released to the stable channel with 15 security fixes, including 10 that address vulnerabilities reported by external researchers.

Google this week announced the release of Chrome 113 to the stable channel with 15 security fixes, including patches for 10 vulnerabilities reported by external researchers.

Released roughly two weeks after Google resolved two zero-day vulnerabilities in the popular browser, the latest Chrome update only resolves medium- and low-severity flaws, despite the major version change.

Even if none of the externally reported flaws was severe, however, the internet giant paid over $30,000 in bug bounty rewards to the reporting researchers, its advisory reveals.

The highest reward was handed out for a medium-severity inappropriate implementation flaw in Prompts. Rong Jian earned $7,500 for reporting this issue, which is tracked as CVE-2023-2459.

Four other medium-severity inappropriate implementation bugs also addressed in this browser release were identified in Chrome components such as Prompts, Screen Mode, PictureInPicture, and CORS.

Chrome 113 resolves two other medium-severity bugs, namely an insufficient validation of untrusted input vulnerability in Extensions (awarded a $5,000 bug bounty) and a use-after-free flaw in OS inputs (rewarded with a $4,000 bounty).

The remaining three externally reported issues were low-severity inappropriate implementation vulnerabilities impacting Prompts and PictureInPicture.

The latest browser iteration is now rolling out as Chrome version 113.0.5672.63 for Linux and macOS, and as Chrome versions 113.0.5672.63/.64 for Windows.

Advertisement. Scroll to continue reading.

Related: CISA Adds Chrome, macOS Bugs to Known Exploited Vulnerabilities Catalog

Related: Google Warns of New Chrome Zero-Day Attack

Related: Chrome 112 Patches 16 Security Flaws

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.