» » Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107

Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107

Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107

Dwelling › Vulnerabilities

Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107

By Ionut Arghire on October 26, 2022

Tweet

Google this week introduced the discharge of Chrome 107 to the secure channel, with patches for 14 vulnerabilities, together with high-severity bugs reported by exterior researchers.

A complete of ten safety bugs have been reported externally: three high-severity, six medium-severity, and one low-severity points.

To take advantage of these flaws, a distant attacker must trick a person into accessing a specifically crafted webpage in a susceptible browser. Profitable exploitation may enable the attacker to execute arbitrary code or trigger a denial-of-service (DoS) situation on the affected system.

Primarily based on the paid bug bounty rewards, essentially the most extreme of those externally reported safety defects is CVE-2022-3652, which is described as a sort confusion within the V8 open supply JavaScript and WebAssembly engine. Google says it has paid $20,000 to the reporting researcher.

Subsequent in line is CVE-2022-3653, a heap-buffer overflow vulnerability within the Vulkan {hardware} acceleration engine. Google says it has handed out a $17,000 reward to the researcher who recognized it.

The third high-severity vulnerability resolved with this browser launch is CVE-2022-3654, a use-after-free challenge in Format. Google says it has but to find out the quantity to be paid for it.

The web big has awarded a complete of $17,000 for the six externally reported medium-severity vulnerabilities that Chrome 107 resolves.

These embrace a heap buffer overflow in Media Galleries, inadequate knowledge validation in File System, an inappropriate implementation in full display mode, and use-after-free bugs in Extensions, Suggestions service on Chrome OS, and Accessibility.

An extra $3,000 was paid for the low-severity challenge, for a complete of $54,000, however the complete quantity could be a lot increased, as soon as Google proclaims the reward for the third high-severity vulnerability.

The most recent Chrome iteration is now rolling out to Mac, Linux, and Home windows customers as variations 107.0.5304.62, 107.0.5304.68, and 107.0.5304.62/63, respectively.

Associated: Chrome 106 Replace Patches A number of Excessive-Severity Vulnerabilities

Associated: Chrome 106 Patches Excessive-Severity Vulnerabilities

Associated: Chrome 105 Replace Patches Excessive-Severity Vulnerabilities

Get the Each day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • VMware Patches Crucial Vulnerability in Finish-of-Life Product
  • Drizly Agrees to Tighten Knowledge Safety After Alleged Breach
  • Leveraging Managed Companies to Optimize Your Menace Intelligence Program Throughout an Financial Downturn
  • Spyderbat Raises $10 Million for Cloud and Container Safety Platform
  • Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107
  • Microsoft M12 Leads $25 Million Valence Safety Sequence A
  • Knowledge Breach Victims Sue Rhode Island Transit Company, Insurer
  • Knowledge Breach at Australian Well being Insurer Impacts four Million Clients; May Value $35M
  • OpenSSL to Patch First Crucial Vulnerability Since 2016
  • Cisco Confirms In-the-Wild Exploitation of Two VPN Vulnerabilities

Searching for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Pc Says About You

Be in a Place to Act By way of Cyber Situational Consciousness

Report Exhibits Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

Find out how to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

Find out how to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles