Google has shelled out another $7,000 in bounties to acquire and fix multiple "high-risk" security holes in its Chrome browser.
The new Google Chrome version 12.0.742.112, available for all platforms, addresses security vulnerabilities that expose users to remote code execution attacks.
Google isn't releasing the technical details on these vulnerabilities until the browser's self-patching mechanism pushes the update to the majority of users.
- [$1000]  Medium CVE-2011-2345: Out-of-bounds read in NPAPI string handling. Credit to Philippe Arteau.
- [$1000]  High CVE-2011-2346: Use-after-free in SVG font handling. Credit to miaubiz.
- [$1000]  High CVE-2011-2347: Memory corruption in CSS parsing. Credit to miaubiz.
- [$500]  High CVE-2011-2350: Lifetime and re-entrancy issues in the HTML parser. Credit to miaubiz.
- [$500]  High CVE-2011-2348: Bad bounds check in v8. Credit to Aki Helin of OUSPG.
- [$1000]  High CVE-2011-2351: Use-after-free with SVG use element. Credit to miaubiz.
- [$1000]  High CVE-2011-2349: Use-after-free in text selection. Credit to miaubiz.
The patch also contains an updated version of Adobe Flash Player.