Google this week announced the release of Chrome 114 to the stable channel with a total of 18 security fixes inside, including 13 that resolve vulnerabilities reported by external researchers.
Of the externally reported flaws, eight have a severity rating of ‘high’, with six of them being memory safety bugs.
Based on the awarded bug bounty, the most important of these is CVE-2023-2929, an out-of-bounds write issue in Swiftshader. Security researcher Jaehun Jeong received a $15,000 reward for reporting the flaw, Google notes in an advisory.
Next in line is CVE-2023-2930, a use-after-free bug in Extensions, for which Google handed out a $10,000 bug bounty.
Security researchers with Viettel Cyber Security reported three use-after-free vulnerabilities in the browser’s PDF component, each of them issued a $9,000 bug bounty reward.
All three issues were reported by Google Project Zero researchers and, per Google’s policy, no bug bounty reward will be issued for any of them.
Chrome 114 also resolves four medium-severity defects reported by external researchers, including three inappropriate implementation flaws in Picture and Downloads, and one insufficient data validation bug in Installer.
A low-severity inappropriate implementation issue in the Extensions API was also addressed in this browser release.
In total, Google handed out more than $65,000 in bug bounty rewards to the security researchers who reported these vulnerabilities.
The latest Chrome iteration is rolling out as version 114.0.5735.90 for Linux and macOS, and as versions 114.0.5735.90/91 for Windows.
Google makes no mention of any of these flaws being exploited in malicious attacks.