Security Experts:

Connect with us

Hi, what are you looking for?



Google Awards Over $130,000 for Flaws Patched With Release of Chrome 93

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

A total of five high-severity security bugs addressed with the latest Chrome release were reported externally, all being use-after-free flaws affecting various browser components.

The most severe of these appears to be CVE-2021-30606, a use-after-free in Blink that was reported by 360 Alpha Lab researchers Nan Wang and koocola in late July. Google paid a $20,000 bounty reward for the discovery.

Three other high-severity use-after-free issues were patched in Permissions (CVE-2021-30607), Web Share (CVE-2021-30608), and Sign-In (CVE-2021-30609). Google paid for these vulnerability reports $10,000, $7,500, and $5,000, respectively.

Another high-severity bug addressed with this Chrome release was found in Extensions API. However, Google hasn’t issued a reward for the bug as it was reported by someone from browser developer Vivaldi. As per the rules of its Chrome vulnerability reward program, “Chromium embedders and companies with whom Google has a pre-existing business relationship may not be eligible for rewards.”

Of the 12 medium-severity flaws patched with this browser iteration, five were use-after-free issues, affecting WebRTC (two security holes), Base internals, Media, and WebApp Installs. Google paid $20,000 for each of the first two and $15,000 for the third bug.

Other medium-severity vulnerabilities included heap buffer overflow, cross-origin data leak, policy bypass, inappropriate implementation, UI spoofing (two bugs), and insufficient policy enforcement.

Two low-severity flaws were patched with the latest Chrome release, both use-after-free issues. Google says it paid a $10,000 reward for the first, but has yet to determine the amount paid for the second.

Overall, Google says it paid over $130,000 in bounty rewards to the reporting researchers.

The latest Chrome iteration is now rolling out to Windows, Mac and Linux users as Chrome 93.0.4577.63.

Related: Google Awards $42,000 for Two Serious Chrome Vulnerabilities

Related: Chrome 92 Brings Several Privacy, Security Improvements

Related: Google Adds HTTPS-First Mode to Chrome

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


A high-severity format string vulnerability in F5 BIG-IP can be exploited to cause a DoS condition and potentially execute arbitrary code.