Google this week announced the release of a Chrome 107 update that resolves 10 vulnerabilities, including six high-severity bugs reported by external researchers.
Four of the externally reported security defects are use-after-free issues for which Google paid a total of $45,000 in bug bounty rewards to the reporting researchers.
Based on the received reward, $21,000, the most severe of these flaws is CVE-2022-3885, a use-after-free in the V8 open source JavaScript and WebAssembly engine.
Next in line is CVE-2022-3886, a vulnerability in Chrome’s speech recognition component, for which a researcher received a $10,000 bug bounty reward.
Google also patched use-after-free vulnerabilities impacting Chrome’s Web Workers and WebCodecs components and says it has paid $7,000 for each of these issues.
The two remaining Chrome 107 high-severity vulnerabilities that were reported externally include CVE-2022-3889, a type confusion in the V8 engine, and CVE-2022-3890, a heap buffer overflow in Crashpad.
Google says it has yet to determine the bug bounty amounts to be paid for the last two vulnerabilities, meaning that the total handed out to the reporting researchers might be higher than $45,000.
The internet giant makes no mention of any of these vulnerabilities being exploited in attacks.
The latest Chrome iteration is now rolling out to macOS and Linux users as version 107.0.5304.110, and to Windows users as version 107.0.5304.106/.107.
Roughly two weeks ago, Google released an emergency update to patch an actively exploited zero-day in Chrome 107.
Related: Google Releases Emergency Chrome 107 Update to Patch Actively Exploited Zero-Day
Related: Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107
Related: Chrome 106 Update Patches Several High-Severity Vulnerabilities
Related: Chrome 106 Patches High-Severity Vulnerabilities
More from Ionut Arghire
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- GitLab Security Update Patches Critical Vulnerability
- Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update
Latest News
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
- Security Pros: Before You Do Anything, Understand Your Threat Landscape

