Отправлено пользователем Anonymous через Google Reader:
источник: Google Chrome Releases, Автор: Jason Kersey, дата: 02.09.10
Google Chrome 6.0.472.53 has been released to the stable and beta channels for Windows, Mac, and Linux. Updates from the previous stable release include:
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
In addition, we would like to credit Google Chrome Security Team (Inferno), James Robinson (Chromium development community), Google Chrome Security Team (Cris Neckar), Aki Helin of OUSPG, Fred Akalin (Chromium development community), Anna Popivanova, "myusualnickname", Michal Zalewski of the Google Security Team, kuzzcc and Aaron Boodman (Chromium development community) for finding bugs during the development cycle such that they never reached a stable build.
If you find new issues, please let us know by filing a bug. If you would like to use the stable channel, you can find out more about changing your Chrome channel.
Jason Kersey
Google Chrome
- Updated UI
- Form Autofill
- Syncing of extensions and Autofill data
- Increased speed and stability
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
- [34414] Low Pop-up blocker bypass with blank frame target. Credit to Google Chrome Security Team (Inferno) and "ironfist99".
- [37201] Medium URL bar visual spoofing with homographic sequences. Credit to Chris Weber of Casaba Security.
- [41654] Medium Apply more restrictions on setting clipboard content. Credit to Brook Novak.
- [45659] High Stale pointer with SVG filters. Credit to Tavis Ormandy of the Google Security Team.
- [45876] Medium Possible installed extension enumeration. Credit to Lostmon.
- [46750] [51846] Low Browser NULL crash with WebSockets. Credit to Google Chrome Security Team (SkyLined), Google Chrome Security Team (Justin Schuh) and Keith Campbell.
- [$1000] [50386] High Use-after-free in Notifications presenter. Credit to Sergey Glazunov.
- [50839] High Notification permissions memory corruption. Credit to Michal Zalewski of the Google Security Team and Google Chrome Security Team (SkyLined).
- [$1337] [51630] [51739] High Integer errors in WebSockets. Credit to Keith Campbell and Google Chrome Security Team (Cris Neckar).
- [$500] [51653] High Memory corruption with counter nodes. Credit to kuzzcc.
- [51727] Low Avoid storing excessive autocomplete entries. Credit to Google Chrome Security Team (Inferno).
- [52443] High Stale pointer in focus handling. Credit to VUPEN Vulnerability Research Team (VUPEN-SR-2010-249).
- [$1000] [52682] High Sandbox parameter deserialization error. Credit to Ashutosh Mehra and Vineet Batra of the Adobe Reader Sandbox Team.
- [$500] [53001] Medium Cross-origin image theft. Credit to Isaac Dawson.
In addition, we would like to credit Google Chrome Security Team (Inferno), James Robinson (Chromium development community), Google Chrome Security Team (Cris Neckar), Aki Helin of OUSPG, Fred Akalin (Chromium development community), Anna Popivanova, "myusualnickname", Michal Zalewski of the Google Security Team, kuzzcc and Aaron Boodman (Chromium development community) for finding bugs during the development cycle such that they never reached a stable build.
If you find new issues, please let us know by filing a bug. If you would like to use the stable channel, you can find out more about changing your Chrome channel.
Jason Kersey
Google Chrome
Здесь вы можете:
- Подписаться на Google Chrome Releases с помощью Google Reader
- Начать использовать Google Reader, чтобы быть в курсе обновлений на всех выбранных вами сайтах