Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Google Awards Over $130,000 for Flaws Patched With Release of Chrome 93

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

A total of five high-severity security bugs addressed with the latest Chrome release were reported externally, all being use-after-free flaws affecting various browser components.

The most severe of these appears to be CVE-2021-30606, a use-after-free in Blink that was reported by 360 Alpha Lab researchers Nan Wang and koocola in late July. Google paid a $20,000 bounty reward for the discovery.

Three other high-severity use-after-free issues were patched in Permissions (CVE-2021-30607), Web Share (CVE-2021-30608), and Sign-In (CVE-2021-30609). Google paid for these vulnerability reports $10,000, $7,500, and $5,000, respectively.

Another high-severity bug addressed with this Chrome release was found in Extensions API. However, Google hasn’t issued a reward for the bug as it was reported by someone from browser developer Vivaldi. As per the rules of its Chrome vulnerability reward program, “Chromium embedders and companies with whom Google has a pre-existing business relationship may not be eligible for rewards.”

Of the 12 medium-severity flaws patched with this browser iteration, five were use-after-free issues, affecting WebRTC (two security holes), Base internals, Media, and WebApp Installs. Google paid $20,000 for each of the first two and $15,000 for the third bug.

Other medium-severity vulnerabilities included heap buffer overflow, cross-origin data leak, policy bypass, inappropriate implementation, UI spoofing (two bugs), and insufficient policy enforcement.

Two low-severity flaws were patched with the latest Chrome release, both use-after-free issues. Google says it paid a $10,000 reward for the first, but has yet to determine the amount paid for the second.

Advertisement. Scroll to continue reading.

Overall, Google says it paid over $130,000 in bounty rewards to the reporting researchers.

The latest Chrome iteration is now rolling out to Windows, Mac and Linux users as Chrome 93.0.4577.63.

Related: Google Awards $42,000 for Two Serious Chrome Vulnerabilities

Related: Chrome 92 Brings Several Privacy, Security Improvements

Related: Google Adds HTTPS-First Mode to Chrome

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Software giant Atlassian has named David Cross as its new CISO.

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.