Google plugs 'high-risk' Chrome browser holes

Google has shelled out another $7,000 in bounties to acquire and fix multiple "high-risk" security holes in its Chrome browser.

Google has shelled out another $7,000 in bounties to acquire and fix multiple "high-risk" security holes in its Chrome browser.

The new Google Chrome version 12.0.742.112, available for all platforms, addresses security vulnerabilities that expose users to remote code execution attacks.

Google isn't releasing the technical details on these vulnerabilities until the browser's self-patching mechanism pushes the update to the majority of users.

follow Ryan Naraine on twitter
The Chrome Stable channel has been updated to 12.0.742.112 for all platforms.  This release contains an updated version of Adobe Flash, along with the security fixes noted below.
Some basic details:
  • [$1000] [77493] Medium CVE-2011-2345: Out-of-bounds read in NPAPI string handling. Credit to Philippe Arteau.
  • [$1000] [84355] High CVE-2011-2346: Use-after-free in SVG font handling. Credit to miaubiz.
  • [$1000] [85003] High CVE-2011-2347: Memory corruption in CSS parsing. Credit to miaubiz.
  • [$500] [85102] High CVE-2011-2350: Lifetime and re-entrancy issues in the HTML parser. Credit to miaubiz.
  • [$500] [85177] High CVE-2011-2348: Bad bounds check in v8. Credit to Aki Helin of OUSPG.
  • [$1000] [85211] High CVE-2011-2351: Use-after-free with SVG use element. Credit to miaubiz.
  • [$1000] [85418] High CVE-2011-2349: Use-after-free in text selection. Credit to miaubiz.

The patch also contains an updated version of Adobe Flash Player.

Newsletters

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All