Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新) - Win8.1 & Win8 资源区 IT之家论坛
找回密码 注册
查看: 7484|回复: 6

[网络软件] Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新)


签到天数: 1570 天


发表于 2015-3-4 14:04:22 | 显示全部楼层 |阅读模式


您需要 登录 才可以下载或查看,没有帐号?注册

本帖最后由 TianLi520 于 2015-3-8 14:06 编辑

Google Chrome稳定版发布大版本更新,版本号更新为41.0.2272.76

Chrome团队很高兴地宣布适用于Windows,Mac和Linux的Chrome 41稳定版发布。Chrome 41.0.2272.76 包含大量的修正和改进,其中包括:
注: 访问错误的详细信息和链接可能保持受限,直至大多数用户更新与修复。这种情况通常发生于其他项目依赖的第三方库中存在bug但还没有修复的时候。
此更新包括51个安全修补程序。包括:Media、Skia过滤器、Vpxdecoder、PDFium的越界读取问题,V8引擎绑定、DOM、GIF解码器、Web数据库、Service WorkersUse-after-free问题,V8引擎绑定、V8引擎的类型混乱问题,WebGL的整数溢出问题,调试器中的验证问题,Blink、

在 V8引擎 4.1 分支(目前前端修复的多个漏洞。

(翻译来自Google & Bing,水平有限,如有错漏请见谅)


The Chrome team is delighted to announce the promotion of Chrome 41 to the stable channel for Windows, Mac and Linux. Chrome 41.0.2272.76 contains a number of fixes and improvements, including:
  • A number of new apps/extension APIs
  • Lots of under the hood changes for stability and performance
A list of changes is available in the log.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 51 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

[$7500][456516] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
[$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
[$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
[$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
[$3000][446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
[$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
[$2500][455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
[$2500][448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
[$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
[449610] High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP’s Zero Day Initiative.
[$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
[$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
[$1000][456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
[$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
[$1000][444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
[$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will be updated here when all reports have gone through the reward panel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:
  • [463349] CVE-2015-1231: Various fixes from internal audits, fuzzing and other initiatives.
  • Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch (currently

Many of the above bugs were detected using AddressSanitizer or MemorySanitizer.

Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Penny MacNeil
Google Chrome


QQ截图20150304133716.png QQ截图20150304133757.png




用于单个用户帐户的备用安装程序默认安装位置在“C:\Program Files\Google\Chrome\Application”,如果UAC提示时点否,然后继续安装,才会安装到“C:\Users\【用户名】\AppData\Local\Google\Chrome\Application”
,必须管理员身份才能安装,默认安装位置在“C:\Program Files\Google\Chrome\Application”

签到天数: 1570 天


 楼主| 发表于 2015-3-8 14:05:47 | 显示全部楼层
@@@ 发表于 2015-3-7 13:07


签到天数: 225 天


发表于 2015-3-4 22:49:37 | 显示全部楼层

签到天数: 796 天


发表于 2015-3-5 10:41:50 | 显示全部楼层

签到天数: 174 天


发表于 2015-3-5 13:51:37 | 显示全部楼层
估计几天之后又会有小幅度的更新,不是因为别的,只因为 Adobe Flash Player 这个漏洞之王 ………… TMD,这货怎么还没有死呢?

签到天数: 1193 天


发表于 2015-3-7 13:07:24 | 显示全部楼层

签到天数: 32 天


发表于 2016-5-10 06:28:36 | 显示全部楼层
您需要登录后才可以回帖 登录 | 注册


版权所有 © 2007-2015 软媒公司