Google this week announced the release of a Chrome 107 update that resolves 10 vulnerabilities, including six high-severity bugs reported by external researchers.
Four of the externally reported security defects are use-after-free issues for which Google paid a total of $45,000 in bug bounty rewards to the reporting researchers.
Next in line is CVE-2022-3886, a vulnerability in Chrome’s speech recognition component, for which a researcher received a $10,000 bug bounty reward.
Google also patched use-after-free vulnerabilities impacting Chrome’s Web Workers and WebCodecs components and says it has paid $7,000 for each of these issues.
The two remaining Chrome 107 high-severity vulnerabilities that were reported externally include CVE-2022-3889, a type confusion in the V8 engine, and CVE-2022-3890, a heap buffer overflow in Crashpad.
Google says it has yet to determine the bug bounty amounts to be paid for the last two vulnerabilities, meaning that the total handed out to the reporting researchers might be higher than $45,000.
The internet giant makes no mention of any of these vulnerabilities being exploited in attacks.
The latest Chrome iteration is now rolling out to macOS and Linux users as version 107.0.5304.110, and to Windows users as version 107.0.5304.106/.107.
Roughly two weeks ago, Google released an emergency update to patch an actively exploited zero-day in Chrome 107.
Ionut Arghire is an international correspondent for SecurityWeek. Previous Columns by Ionut Arghire:Tags: