Google this week announced the release of a Chrome 107 update that resolves 10 vulnerabilities, including six high-severity bugs reported by external researchers.
Four of the externally reported security defects are use-after-free issues for which Google paid a total of $45,000 in bug bounty rewards to the reporting researchers.
Based on the received reward, $21,000, the most severe of these flaws is CVE-2022-3885, a use-after-free in the V8 open source JavaScript and WebAssembly engine.
Next in line is CVE-2022-3886, a vulnerability in Chrome’s speech recognition component, for which a researcher received a $10,000 bug bounty reward.
Google also patched use-after-free vulnerabilities impacting Chrome’s Web Workers and WebCodecs components and says it has paid $7,000 for each of these issues.
The two remaining Chrome 107 high-severity vulnerabilities that were reported externally include CVE-2022-3889, a type confusion in the V8 engine, and CVE-2022-3890, a heap buffer overflow in Crashpad.
Google says it has yet to determine the bug bounty amounts to be paid for the last two vulnerabilities, meaning that the total handed out to the reporting researchers might be higher than $45,000.
The internet giant makes no mention of any of these vulnerabilities being exploited in attacks.
The latest Chrome iteration is now rolling out to macOS and Linux users as version 107.0.5304.110, and to Windows users as version 107.0.5304.106/.107.
Roughly two weeks ago, Google released an emergency update to patch an actively exploited zero-day in Chrome 107.
Related: Google Releases Emergency Chrome 107 Update to Patch Actively Exploited Zero-Day
Related: Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107
Related: Chrome 106 Update Patches Several High-Severity Vulnerabilities

More from Ionut Arghire
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
Latest News
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- VMware ESXi Servers Targeted in Ransomware Attack via Old Vulnerability
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
