Vulnerabilities

Google Pays Out $41,000 for Three Serious Chrome Vulnerabilities

Google releases a Chrome 123 update to resolve three high-severity memory safety vulnerabilities.

Chrome security updates

Google on Wednesday released a new Chrome 123 security update that addresses three high-severity memory safety bugs reported by external researchers.

The first vulnerability, tracked as CVE-2024-3157, is described as an out-of-bounds write issue in Compositing. The internet giant handed out a $21,000 bug bounty reward for this flaw.

According to a NIST advisory, a remote attacker who has compromised the GPU process could exploit this vulnerability to perform a sandbox escape via specific UI gestures.

Tracked as CVE-2024-3516, the second security defect is a heap buffer overflow bug in the ANGLE rendering engine that could allow a remote attacker to exploit heap corruption via malicious web pages.

The third issue, tracked as CVE-2024-3515, is a use-after-free bug in Dawn, also leading to the exploitation of heap corruption via crafted web pages.

Google notes in its advisory that it paid out bug bounty rewards of $10,000 for each of the last two security holes.

The latest Chrome update is now rolling out as version 123.0.6312.122 for Linux, versions 123.0.6312.122/.123 for Windows, and versions 123.0.6312.122/.123/.124 for macOS.

The internet giant makes no mention of any of these vulnerabilities being exploited in malicious attacks.

Advertisement. Scroll to continue reading.

However, memory safety bugs in Chrome have been a major issue, as all the browser zero-days exploited in the wild between 2021 and 2023 started with a memory corruption bug leading to remote code execution.

Google has been battling memory safety bugs in Chrome for a while, with the introduction of runtime checks and the transition to the Rust programming language, which is considered memory safe, and has made the exploitation of use-after-free flaws more difficult.

Last week, the company announced the addition of a sandbox for V8, to prevent the exploitation of memory safety bugs in the browser’s JavaScript engine.

Related: Chrome to Fight Cookie Theft With Device Bound Session Credentials

Related: Google Patches Chrome Flaw That Earned Hackers $42,500 at Pwn2Own

Related: Chrome Update Patches Zero-Day Vulnerabilities Exploited at Pwn2Own

Related Content

Vulnerabilities

Google has patched CVE-2024-4761, the second exploited vulnerability addressed by the company within one week.

Vulnerabilities

A Chrome 124 update patches the second Chrome zero-day that has been found to be exploited in malicious attacks in 2024.

Vulnerabilities

Google patches CVE-2024-4058, a critical Chrome vulnerability for which researchers earned a $16,000 reward. 

Vulnerabilities

Chrome and Firefox security updates resolve over 35 vulnerabilities, including a dozen high-severity bugs.

Vulnerabilities

Google fights Chrome V8 engine memory safety bugs with a new sandbox and adds it to the bug bounty program.

Vulnerabilities

Google pushes a new Chrome update to patch another zero-day vulnerability demonstrated at a hacking contest.

Data Protection

Google is bringing to Chrome new features to bind browser sessions to the device and protect users against cookie theft.

Vulnerabilities

Chrome and Firefox security updates released on Tuesday resolve a critical-severity and multiple high-severity vulnerabilities.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version