Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新) - Win8.1 & Win8 资源区 IT之家论坛
找回密码 注册
查看: 7458|回复: 6

[网络软件] Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新)

[复制链接]

签到天数: 1570 天

[LV.Master]伴坛终老

发表于 2015-3-4 14:04:22 | 显示全部楼层 |阅读模式

马上注册,欢迎加入IT之家社区大家庭。

您需要 登录 才可以下载或查看,没有帐号?注册

x
本帖最后由 TianLi520 于 2015-3-8 14:06 编辑

Google Chrome稳定版发布大版本更新,版本号更新为41.0.2272.76

更新信息:
Chrome团队很高兴地宣布适用于Windows,Mac和Linux的Chrome 41稳定版发布。Chrome 41.0.2272.76 包含大量的修正和改进,其中包括:
1、增加大量新应用/扩展API
2、大量内核修改提升性能和稳定性
注: 访问错误的详细信息和链接可能保持受限,直至大多数用户更新与修复。这种情况通常发生于其他项目依赖的第三方库中存在bug但还没有修复的时候。
此更新包括51个安全修补程序。包括:Media、Skia过滤器、Vpxdecoder、PDFium的越界读取问题,V8引擎绑定、DOM、GIF解码器、Web数据库、Service WorkersUse-after-free问题,V8引擎绑定、V8引擎的类型混乱问题,WebGL的整数溢出问题,调试器中的验证问题,Blink、
Rendering的未初始化值的问题,通过代理的Cookies注入问题等。我们还要感谢所有参与我们在开发周期的工作的安全研究人员确保安全漏洞无法到达稳定的渠道像往常一样,我们正在进内部安全工作负责范围的广泛修补程序:
从内部审计的各种修正,模糊和其他措施等。

在 V8引擎 4.1 分支(目前 4.1.0.21)前端修复的多个漏洞。

(翻译来自Google & Bing,水平有限,如有错漏请见谅)

详细更新信息:

The Chrome team is delighted to announce the promotion of Chrome 41 to the stable channel for Windows, Mac and Linux. Chrome 41.0.2272.76 contains a number of fixes and improvements, including:
  • A number of new apps/extension APIs
  • Lots of under the hood changes for stability and performance
A list of changes is available in the log.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 51 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

[$7500][456516] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
[$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
[$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
[$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
[$3000][446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
[$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
[$2500][455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
[$2500][448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
[$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
[449610] High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP’s Zero Day Initiative.
[$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
[$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
[$1000][456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
[$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
[$1000][444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
[$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will be updated here when all reports have gone through the reward panel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:
  • [463349] CVE-2015-1231: Various fixes from internal audits, fuzzing and other initiatives.
  • Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch (currently 4.1.0.21).

Many of the above bugs were detected using AddressSanitizer or MemorySanitizer.

Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Penny MacNeil
Google Chrome

部分截图:

QQ截图20150304133716.png QQ截图20150304133757.png

下载地址:

1、官方下载:
用于所有用户帐户的备用安装程序
用于单个用户帐户的备用安装程序

2、百度网盘
(推荐下载方式,含有32位、64位离线安装包以及不带更新模块可制作便携版的版本)

P.S.
用于单个用户帐户的备用安装程序默认安装位置在“C:\Program Files\Google\Chrome\Application”,如果UAC提示时点否,然后继续安装,才会安装到“C:\Users\【用户名】\AppData\Local\Google\Chrome\Application”
而用于所有用户帐户的备用安装程序
,必须管理员身份才能安装,默认安装位置在“C:\Program Files\Google\Chrome\Application”
以上两个版本皆为含有更新模块的完整离线安装包
文件名中含有“installer
的为不带更新模块可制作便携版的版本,不建议直接运行安装


签到天数: 1570 天

[LV.Master]伴坛终老

 楼主| 发表于 2015-3-8 14:05:47 | 显示全部楼层
@@@ 发表于 2015-3-7 13:07
版主,更新时可否把Mac版本增加进去?

没有mac设备,我保存的程序是否可用都不知道

签到天数: 225 天

[LV.7]常住居民III

发表于 2015-3-4 22:49:37 | 显示全部楼层
不能自动更新,只有下载重新安装了,辛苦了

签到天数: 796 天

[LV.10]以坛为家III

发表于 2015-3-5 10:41:50 | 显示全部楼层
每次更新都来管理这...

签到天数: 174 天

[LV.7]常住居民III

发表于 2015-3-5 13:51:37 | 显示全部楼层
估计几天之后又会有小幅度的更新,不是因为别的,只因为 Adobe Flash Player 这个漏洞之王 ………… TMD,这货怎么还没有死呢?

签到天数: 1193 天

[LV.10]以坛为家III

发表于 2015-3-7 13:07:24 | 显示全部楼层
版主,更新时可否把Mac版本增加进去?

签到天数: 32 天

[LV.5]常住居民I

发表于 2016-5-10 06:28:36 | 显示全部楼层
强帖终于出现,要顶的啊,谢谢楼主
您需要登录后才可以回帖 登录 | 注册

本版积分规则

版权所有 © 2007-2015 软媒公司

站点统计|Archiver|IT之家

返回顶部