Google Patches Chrome 52 Holes
Monday, August 8, 2016 @ 04:08 PM gHale
Google updated vulnerabilities in Chrome 52.
The search giant resolved 10 security vulnerabilities, seven of which ended up discovered by external developers.
Google provided details on the vulnerabilities reported by third-party developers and the bug bounties paid out to them. Four of the security issues were high risk bugs, three were medium risk, and Google paid $20,500 in bounties to the bug hunters.
When Chrome 52 released two weeks ago, Google provided details only on several of the 48 bugs patched in it. In the meantime, the company updated the released information, and revealed paid over $55,000 in bounties to the developers who discovered flaws in the browser.
With the newly announced Chrome 52.0.2743.116 update – available for download for Windows, Mac, and Linux machines –, the amount paid in bug bounties patched in Chrome 52 amounts to over $75,000.
The first two high risk flaws addressed in the new release are an address bar spoofing (CVE-2016-5141) and a use-after-free in blink (CVE-2016-5142), both credited to Sergey Glazunov and awarded $4,000 each. The third and the fourth are heap overflow bugs in pdfium, one (CVE-2016-5139) discovered by GiWan Go of Stealien ($3,000), and the other (CVE-2016-5140) reported by Ke Liu of Tencent’s Xuanwu LAB ($3,500).
The first of the three medium risk flaws (CVE-2016-5145) is a same origin bypass for images in blink, which earned Sergey Glazunov another $4,000. The other two are parameter sanitization failure bugs in DevTools (CVE-2016-5143 and CVE-2016-5144), discovered by Gregory Panakkal, who earned $1000 for each of them.