Security Experts:

Connect with us

Hi, what are you looking for?



Google Awards Over $130,000 for Flaws Patched With Release of Chrome 93

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

Google this week announced the release of Chrome 93 with a total of 27 security patches inside, including 19 for vulnerabilities that were reported by external researchers.

A total of five high-severity security bugs addressed with the latest Chrome release were reported externally, all being use-after-free flaws affecting various browser components.

The most severe of these appears to be CVE-2021-30606, a use-after-free in Blink that was reported by 360 Alpha Lab researchers Nan Wang and koocola in late July. Google paid a $20,000 bounty reward for the discovery.

Three other high-severity use-after-free issues were patched in Permissions (CVE-2021-30607), Web Share (CVE-2021-30608), and Sign-In (CVE-2021-30609). Google paid for these vulnerability reports $10,000, $7,500, and $5,000, respectively.

Another high-severity bug addressed with this Chrome release was found in Extensions API. However, Google hasn’t issued a reward for the bug as it was reported by someone from browser developer Vivaldi. As per the rules of its Chrome vulnerability reward program, “Chromium embedders and companies with whom Google has a pre-existing business relationship may not be eligible for rewards.”

Of the 12 medium-severity flaws patched with this browser iteration, five were use-after-free issues, affecting WebRTC (two security holes), Base internals, Media, and WebApp Installs. Google paid $20,000 for each of the first two and $15,000 for the third bug.

Other medium-severity vulnerabilities included heap buffer overflow, cross-origin data leak, policy bypass, inappropriate implementation, UI spoofing (two bugs), and insufficient policy enforcement.

Two low-severity flaws were patched with the latest Chrome release, both use-after-free issues. Google says it paid a $10,000 reward for the first, but has yet to determine the amount paid for the second.

Overall, Google says it paid over $130,000 in bounty rewards to the reporting researchers.

The latest Chrome iteration is now rolling out to Windows, Mac and Linux users as Chrome 93.0.4577.63.

Related: Google Awards $42,000 for Two Serious Chrome Vulnerabilities

Related: Chrome 92 Brings Several Privacy, Security Improvements

Related: Google Adds HTTPS-First Mode to Chrome

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.