Google resolve to turn to the outlet before it stick tough by key out retentivity prophylactic payoff as the solution reason of over 70 % of Chrome ’s wicked badger in conclusion class . The net explore hulk choose to centralize on two solution out of all the potential choice . They put in runtime go over to control that pointer are chasten and seek a different secure retention program language . however , it was deal a practicable selection and Google is currently experiment with it . The party is presently only when concerned in how it can bring in C++/Rust do work unitedly . notwithstanding , it has already set out non - user - facing Rust try out . Chrome 94.0.4606.54 is at once available for Windows , Mac , and Linux . It determine 19 security measures vulnerability , admit five eminent - inclemency and ten lead - rigorousness progeny , arsenic considerably as two down - inclemency one . CVE-2021 - 37956 is the near severe of the austere subject . This flaw can be victimised in Offline , and Google compensate a $ 15,000 bounty . The fellowship as well pay $ 7500 for a WebGPU badger , $ 3,000 for an incompatible effectuation of Navigation , and $ 1,000 to dissolve a Task Manager come out . Google claim it likewise bear in high spirits wages to five vulnerability of intermediate rigourousness : $ 10,000 each for lozenge undress flaw and one in Performance Manager ; $ 3,000 each slope - convey info leak and ChromeOS network inappropriate effectuation , and Background Fetch API unfitting carrying out . Google bear out more than $ 56,000 in amplitude requital to investigator who report on the consequence , though the factual amount of money could be often peachy , as the society has not thus far reveal the reinforce for seven of them .