Google plugs 32 flaws in Chrome 14, doles out $14,337 in bounties

None of the Chrome flaws are rated critical, but 15 are considered high risk, said Google. Six of the high-risk flaws are identified as "use-after-free" bugs, a type of memory management flaw that can be exploited to inject attack code. Ten of the flaws were rated medium, and the remaining seven were ranked low.

Google passed out $3,500 in bug bounties to "miaubiz" and $2,337 to Sergey Glazunov. In addition, Google thanked a number of researchers for working with the company in the development cycle to prevent bugs from reaching the stable channel: “send.my.spam.to”, “Feiler89”, “miaubiz”, the Microsoft Java Team/Microsoft Vulnerability Research, Chris Rohlf of Matasano, Chamal de Silva, Christian Holler, “simon.sarris”, and Alexey Proskuryakov of Apple.

In a blog, Google noted that the new Chrome version contains a web audio application programming interface (API) that enables developers to add audio effects, such as room simulation and spatialization, and Native Client, which is an open-source technology that allows C and C++ code to be executed inside the browser.

Google said it added support to Chrome for Mac OS X Lion’s vanishing scrollbars and full-screen mode.
 

What’s hot on Infosecurity Magazine?