Security News > 2021 > January > Google Pays Out Over $100,000 for Vulnerabilities Patched With Chrome 87 Update
An update released this week by Google for Chrome 87 patches 16 vulnerabilities, including 14 rated high severity.
The company has awarded more than $100,000 for these vulnerabilities.
Eight of the addressed vulnerabilities are use-after-free bugs impacting various components of the web browser.
Google paid the reporting security researchers $20,000 for each of these vulnerabilities.
Other high-risk flaws the new browser release fixes include insufficient policy enforcement in WebUI, heap buffer overflow in Skia, insufficient data validation in networking, and out of bounds write in V8. Google also addressed high-severity memory corruption vulnerabilities that were identified internally, and which were not issued CVE identifiers, as well as medium-severity bugs.
In an alert issued on Thursday, the Multi-State Information Sharing and Analysis Center warned that these vulnerabilities represent a high risk for large and medium government and business entities and advised them to update as soon as possible.
News URL
Related news
- Google to let businesses create curated Chrome Web Stores for extensions (source)
- Lazarus hackers used fake DeFi game to exploit Google Chrome zero-day (source)
- How to enable Safe Browsing in Google Chrome on Android (source)
- Lazarus Group Exploits Google Chrome Vulnerability to Control Infected Devices (source)
- Exploited: Cisco, SharePoint, Chrome vulnerabilities (source)
- New tool bypasses Google Chrome’s new cookie encryption system (source)
- Google says “Enhanced protection” feature in Chrome now uses AI (source)
- Google's AI-Powered OSS-Fuzz Tool Finds 26 Vulnerabilities in Open-Source Projects (source)