(LiveHacking.Com) – Google has released Chrome 17.0.963.83 to fix several ‘High’ level security bugs. In doing so it handed out $4500 to security researchers who found and reported security related bugs in Google’s web browser. The new update also include the start of hardening measures based on study of the exploits submitted to the Pwnium competition.
Security fixes and rewards:
- [$1000]  High CVE-2011-3050: Use-after-free with first-letter handling. Credit to miaubiz.
-  High CVE-2011-3045: libpng integer issue from upstream. Credit to Glenn Randers-Pehrson of the libpng project.
- [$1000]  High CVE-2011-3051: Use-after-free in CSS cross-fade handling. Credit to Arthur Gerkis.
-  High CVE-2011-3052: Memory corruption in WebGL canvas handling. Credit to Ben Vanik of Google.
- [$1000]  High CVE-2011-3053: Use-after-free in block splitting. Credit to miaubiz.
-  Low CVE-2011-3054: Apply additional isolations to webui privileges. Credit to Sergey Glazunov.
-  Low CVE-2011-3055: Prompt in the browser native UI for unpacked extension installation. Credit to PinkiePie.
- [$2000]  High CVE-2011-3056: Cross-origin violation with “magic iframe”. Credit to Sergey Glazunov.
- [$500]  Medium CVE-2011-3057: Invalid read in v8. Credit to Christian Holler.
Google also listed a low severity issue that was fixed in a previous patch but the company had forgotten to issue a proper credit:
-  Low CVE-2011-3049: Extension web request API can interfere with system requests. Credit to Michael Gundlach.
Note that the referenced bugs may be kept private until a majority of Chrome users are up to date with the fix.