"Chrome 116 Patches 26 Vulnerabilities"
Google recently announced the release of Chrome 116 to the stable channel with patches for 26 vulnerabilities, including 21 reported by external researchers. Of the externally reported bugs, eight have a severity rating of "high," with most of them being memory safety issues. Based on the bug bounty reward paid out, the most important of these is CVE-2023-2312, a use-after-free flaw in the Offline component. Google noted that the reporting researcher was awarded a $30,000 bounty for the finding. Next in line is CVE-2023-4349, a use-after-free issue in Device Trust Connectors, followed by an inappropriate implementation in Fullscreen (CVE-2023-4350), and a use-after-free bug in Network (CVE-2023-4351), for which Google paid out bounties of $5,000, $3,000, and $2,000, respectively. Google noted that the remaining four high-severity vulnerabilities that Chrome 116 resolves include a type confusion flaw in the V8 JavaScript engine, a heap buffer overflow bug in ANGLE, another in Skia, and an out-of-bounds memory access issue in the V8 engine. These issues were reported by researchers at Google Project Zero and Microsoft Vulnerability Research, and, per Google's policy, no bug bounty reward will be issued for them. Google stated that all the remaining externally-reported vulnerabilities addressed in Chrome 116 are medium-severity: six inappropriate implementation bugs, three use-after-free issues, two insufficient policy enforcement flaws, one insufficient validation of untrusted input, and one heap buffer overflow vulnerability. Overall, Google gave the reporting researchers $63,000 in bug bounty rewards. The internet giant does not mention any of these vulnerabilities being exploited in attacks. The latest Chrome iteration is rolling out as version 116.0.5845.96 for Mac and Linux and as versions 116.0.5845.96/.97 for Windows.
SecurityWeek reports: "Chrome 116 Patches 26 Vulnerabilities"