Google Pays Out Over $100,000 for Vulnerabilities Patched With Chrome 97 Update
Google on Tuesday announced the release of 26 security patches as part of its latest Chrome update, including one for a critical-severity bug.
A total of 22 vulnerabilities addressed with the latest Chrome refresh were reported by external researchers, including one critical-severity, 16 high-severity, and five medium-severity issues.
There were 12 use-after-free bugs reported externally, impacting Safe Browsing, Site isolation, Web packaging, Omnibox, Printing, Vulkan, Scheduling, Text Input Method Editor, Bookmarks, Optimization Guide, and Data Transfer.
The most important of these security errors is CVE-2022-0289, a critical use-after-free flaw in Safe Browsing that could be exploited to achieve arbitrary code execution. The bug was found by Sergei Glazunov of Google Project Zero.
Glazunov also identified two high-severity vulnerabilities in Chrome, including a use-after-free issue in “Site isolation” that is tracked as CVE-2022-0290 (the same bug was also discovered by Brendon Tiszka) and a heap buffer overflow flaw in PDFium, tracked as CVE-2022-0306.
The remaining high-severity vulnerabilities include eight use-after-free bugs, four inappropriate implementation issues, a heap buffer overflow, and a race condition.
The five medium-severity security defects fixed with the latest Chrome 97 release include two use-after-free issues, one inappropriate implementation bug, and two heap buffer overflow vulnerabilities.
Google says it has paid out $108,000 in bug bounty rewards to the reporting researchers to date, but the Internet giant has yet to determine the reward amounts for nine of the patched vulnerabilities.
The latest Chrome release is now rolling out to desktop users (Windows, macOS, and Linux) as version 97.0.4692.99.
Related: Chrome 97 Patches 37 Vulnerabilities