Google Patches Chrome Second Wave Of Holes In The Browser


Google pays $ 8,500 in premiums for information on serious security vulnerabilities in the Chrome browser.

Google has spent another $ 8,500 to buy information on security vulnerabilities affecting its browser Chrome serious.

The company launched 13.0.782.215 Chrome for Linux, Mac, Windows and Chrome Frame to address several vulnerabilities, some severe enough to expose users to attack the execution of code.

The most serious flaw, discovered by British scientist Michael Braithwaite, was described simply as "memory corruption in the transmission of the head." It only affects Windows users.

This is a list of the vulnerabilities patched the most recent publication Chrome.

[$ 1000] [Windows only] [72 492] CVE-2011-2822 Media: Analysis URL confusion in the command line. Thank you, Vladimir Vorontsova, company available in the SEC.

[82552] CVE-2011-2823 High: use after free in the box under manipulation. Thank you to the team of Google Chrome security (SkyLined) and independent of the subsequent discovery miaubiz.

[$ 1.000] [88216] CVE-2011-2.824 High: use after free of nodes counter. Miaubiz credit.

[88670] CVE-2011-2825 High: use after free with custom fonts. Thank you to wushi team509 reported by ZDI (ZDI-CAN-1283) and the subsequent discovery of indepdendent miaubiz.

[$ 1000], [89 402] High CVE-2011-2821: Double free libxml XPath processing. Thanks for Yang Dingning by NCNIPC, graduated from the University of Chinese Academy of Sciences.

[$ 1,000] [87,453] CVE-2011-2826 High Cross original violation of the original vacuum. Thank you to Sergey Glazunov.

[$ 1337] [Windows only] [89 836] CVE-2011-2806 Critical: A donation of memory Vertex. Thanks, Michael Braithwaite is Turbulenz Limited.

[$ 1000], [90 668] High CVE 2011-2827: Use after free text search. Thank you for miaubiz.

[91517] CVE-2011-2828 High: Out-of-bounds write V8. Thank you to Google Chrome Security Team (SkyLined).

[$ 1500] [only 32-bit] [91598] CVE-2011-2829 High: integer overflow in the tables consistent. Thank you to Sergey Glazunov.

[$ 1,000] [Linux] [91665] CVE-2011-2839 High: MEMS Buggy () in PDF format. Aki Helin thank you to the OUSPG.