(LiveHacking.Com) – Google has released Chrome 20 (20.0.1132.43) for Windows, Mac, and Linux. In doing so it also paid out some $11500 in rewards to security researchers who found potential High risk security vulnerabilities in Chrome and its supporting libraries.
One securty researcher, who goes by the name of Miaubiz, stands out. In Chrome 20 he was awarded $7000 for his efforts in finding securty vulnerabilities in Chrome. The majority of the bugs found were use-after-free bugs which are often used by hackers to develop exploits. The list of Maiubiz’s bugs are:
- [$1000]  High CVE-2012-2817: Use-after-free in table section handling.
- [$1000]  High CVE-2012-2818: Use-after-free in counter layout.
- [$1000]  High CVE-2012-2823: Use-after-free in SVG resource handling.
- [$1000]  High CVE-2012-2824: Use-after-free in SVG painting.
- [$1000]  High CVE-2012-2829: Use-after-free in first-letter handling.
- [$1000]  High CVE-2012-2830: Wild pointer in array value setting.
- [$1000]  High CVE-2012-2831: Use-after-free in SVG reference handling.
- [$1000]  High CVE-2012-2834: Integer overflow in Matroska container. Credit to Jüri Aedla.
-  Low CVE-2012-2815: Leak of iframe fragment id. Credit to Elie Bursztein of Google.
- [Windows only]   High CVE-2012-2816: Prevent sandboxed processes interfering with each other. Credit to Google Chrome Security Team (Justin Schuh).
-  High CVE-2012-2819: Crash in texture handling. Credit to Ken “gets” Russell of the Chromium development community.
-  Medium CVE-2012-2820: Out-of-bounds read in SVG filter handling. Credit to Atte Kettunen of OUSPG.
-  Medium CVE-2012-2821: Autofill display problem. Credit to “simonbrown60”.
- [various] Medium CVE-2012-2822: Misc. lower severity OOB read issues in PDF. Credit to awesome ASAN and various Googlers (Kostya Serebryany, Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).
-  Medium CVE-2012-2826: Out-of-bounds read in texture conversion. Credit to Google Chrome Security Team (Inferno).
- [Mac only]  Low CVE-2012-2827: Use-after-free in Mac UI. Credit to the Chromium development community (Dharani Govindan).
-  High CVE-2012-2828: Integer overflows in PDF. Credit to Mateusz Jurczyk of Google Security Team and Google Chrome Security Team (Chris Evans).
- [Windows only]  Low CVE-2012-2764: Unqualified load of metro DLL. Credit to Moshe Zioni of Comsec Consulting.
-  High CVE-2012-2832: Uninitialized pointer in PDF image codec. Credit to Mateusz Jurczyk of Google Security Team.
-  High CVE-2012-2833: Buffer overflow in PDF JS API. Credit to Mateusz Jurczyk of Google Security Team.
Note that the referenced bugs are kept private until a majority of Chrome users are up to date with the fixes.