"Chrome 109 Patches 17 Vulnerabilities"

Google recently announced the release of Chrome 109 in the stable channel with patches for 17 vulnerabilities, including 14 bugs reported by external researchers.  Most of the externally reported security defects are medium- and low-severity flaws, with only two of them rated "high severity."  These include a use-after-free issue in Overview Mode (CVE-2023-0128) and a heap buffer overflow bug in Network Service (CVE-2023-0129).  Google noted that it paid bug bounties of $4,000 and $2,000 for these vulnerabilities, respectively.  Google stated that a total of eight medium-severity bugs were resolved with the latest browser iteration, five of which are described as inappropriate implementation flaws in Chrome components such as Fullscreen API, Iframe Sandbox, and Permission Prompts.  The remaining issues include two use-after-free vulnerabilities in Cart and a heap buffer overflow bug in Platform Apps.  Chrome 109 also patches four externally reported low-severity vulnerabilities.  Interestingly, Google stated that the highest bug bounty reward was paid out for one of the low-severity issues addressed this week, namely CVE-2023-0138, a heap buffer overflow bug in the libphonenumber component.  The researcher who identified this issue received an $8,000 reward, while the highest bug bounty for a medium-severity issue was $5,000.  In total, Google paid out $39,000 in bug bounty rewards to the reporting researchers, but the final amount might be higher as the company has yet to determine the reward for one of the medium-severity issues.  The latest Chrome iteration is currently rolling out as version 109.0.5414.74 for Linux, version 109.0.5414.74/.75 for Windows, and version 109.0.5414.87 for macOS.  Google is currently unaware of any of these vulnerabilities being exploited in malicious attacks.  

 

SecurityWeek reports: "Chrome 109 Patches 17 Vulnerabilities"

Submitted by Anonymous on