Google pays record $26K in Chrome bug bounties

Revamps New Tab page with upgrade to Chrome 15

By , Computerworld |  Security, Chrome, Google

Google paid out a record $26,511 in bug bounties to researchers who reported some of the 18 Chrome vulnerabilities patched today.

The company also upgraded the stable version of the browser to version 15, which sports a revamped New Tab page.

Google last refreshed Chrome on Sept. 16, just over five weeks ago. Google produces an update to its "stable" channel about every six weeks, a practice that rival Mozilla copied with the debut of Firefox 5 last June.

Eleven of the 18 vulnerabilities were rated "high," the second-most-serious ranking in Google's scoring system, while three were tagged "medium" and another four were marked "low."

Google paid $26,511 in bounties, a record, to four researchers, including $13,674 to Sergey Glazunov and $10,337 to "miaubiz," a pair of regular Chrome vulnerability finders who together have accounted for 57% of all bug payments this year. Google has laid out over $170,000 in bounties so far during 2011.

The previous bounty record, set more than two months ago, was $17,000.

Glazunov and miaubiz collected their five-figure checks for reporting multiple bugs that Google then combined into one CVE (Common Vulnerabilities & Exposures) identifier.

Glazunov, for example, was awarded $12,147 for five bugs that Google named only as "cross-origin policy violations" and pooled under a single CVE in its typically terse description .

Miaubiz, meanwhile, was paid $6,337 for one CVE that actually contained six different bugs tracked by Google in its change database.

As is its habit, Google barred access to the bug tracker database for all the vulnerabilities to prevent outsiders from obtaining details on the flaws.

Most of the bugs uncovered by miaubiz, said Google, were discovered using the company's memory error detection tool, AddressSanitizer , that it released in June.

AddressSanitizer can detect a variety of errors, including "use-after-free" memory management bugs like the ones reported by miaubiz.

Google also said it updated Chrome to stymie BEAST, for "Browser Exploit Against SSL/TLS," a hacking tool released last month that attacks browsers and decrypts cookies, potentially giving attackers access to encrypted website log-on credentials.

Previously, Google had added anti-BEAST protection to Chrome's "dev" and "beta" channels, the rougher-edged versions that precede the stable build.


Originally published on Computerworld |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question