"First Weekly Chrome Security Update Patches High-Severity Vulnerabilities"
Google recently announced a Chrome 116 security update that patches five memory safety vulnerabilities reported by external researchers, including four issues rated high severity. Based on the bug bounty reward Google paid out for these flaws, the most severe of them is CVE-2023-4430, a use-after-free bug in Vulkan, the cross-platform, open standard for 3D graphics. Google noted that the vulnerability was reported by Cassidy Kim, who received a $10,000 bug bounty reward for the finding. Next in line is another use-after-free issue, this time in the Loader component. The flaw is tracked as CVE-2023-4429 and was reported by an anonymous researcher, who received a $3,000 bounty. Google stated that it also handed out a $2,000 reward for a high-severity out-of-bounds memory access vulnerability in CSS. However, per Google’s policy, no bug bounty reward will be paid for a similar issue in the V8 JavaScript engine, which a Google Project Zero researcher reported, nor for a medium-severity out-of-bounds memory access flaw in Fonts that was reported by a Microsoft security researcher. The latest Chrome iteration is rolling out as version 116.0.5845.110 for Mac and Linux and as versions 116.0.5845.110/.111 for Windows. Google makes no mention of any of these vulnerabilities being exploited in attacks.\
SecurityWeek reports: "First Weekly Chrome Security Update Patches High-Severity Vulnerabilities"