WEBINAR: Live Event Date: September 20, 2017 @ 1:00 p.m. ET / 10:00 a.m. PT
Designing a Proactive Approach to Information Security with Cyber Threat Hunting REGISTER >
Google is out with its latest Chrome stable browser release, providing one of the highest security fix counts in the history of Google's popular open source browser.
The Chrome 30.0.1599.66 release, available for Windows, Mac and Linux, provides 50 security fixes. Google is paying security researchers a total of $19,000 in bug bounties for responsible disclosures about flaws that have been fixed in the new Chrome stable release.
The biggest award is a $4,000 bounty to Atte Kettunen of the Oulu University Secure Programming Group (OUSPG), for the discovery of a use-after-free flaw with in-line block rendering. The $4,000 award wasn't the only one Kettunen received for reporting flaws that are now fixed in Chrome 30. Google also awarded Kettunen $2,500 for a race condition flaw in Web audio and an additional $1,000 for the discovery of another use-after-free flaw in XSLT.
Kettunen is also credited by Google, along with researchers "cloudfuzzer" and "miaubiz," for working for with Google during the development process of Chrome 30. The three researchers will share a pool of $8,000 in additional rewards for their efforts.
Use-after-free flaws are a class of memory errors whereby allocated memory could be used after it should no longer be available. An attacker can potentially use the memory space to launch an attack.
In addition to the use-after-free flaws reported by Kettunen, security researcher Chamal de Silva and a researcher identified as 41.w4r10r(at)garage4hackers.com are credited with the discovery of a use-after-free issue in Pepper Plugin API. (PPAPI). A researcher identified only as "cloudfuzzer" discovered a use-after-free flaw in XML document parsing. Researcher Kahlil Zhani found a use-after-free issue in the Windows color chooser dialog box.
Other use-after-free issues reported as fixed in Chrome 30 include DOM, resource loader and template element fixes.
In addition to the use-after-free flaws, Google is also fixing a high impact address bar spoofing flaw identified as CVE-2013-2916. Google is awarding security researcher Masato Kinugawa $2,000 for the discovery of the flaw.
The Chrome 30 fix list is double the 25 flaws that Google fixed in the Chrome 29 stable update in August. Google paid out $6,174 in reward money for that release.
Sean Michael Kerner is a senior editor at eSecurityPlanet and InternetNews.com. Follow him on Twitter @TechJournalist.