Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新) - Win8.1 & Win8 资源区 IT之家论坛
找回密码 注册
查看: 7523|回复: 6
打印 上一主题 下一主题

[网络软件] Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新)

[复制链接]

签到天数: 1570 天

[LV.Master]伴坛终老

跳转到指定楼层
楼主
发表于 2015-3-4 14:04:22 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式

马上注册,欢迎加入IT之家社区大家庭。

您需要 登录 才可以下载或查看,没有帐号?注册

x
本帖最后由 TianLi520 于 2015-3-8 14:06 编辑

Google Chrome稳定版发布大版本更新,版本号更新为41.0.2272.76

更新信息:
Chrome团队很高兴地宣布适用于Windows,Mac和Linux的Chrome 41稳定版发布。Chrome 41.0.2272.76 包含大量的修正和改进,其中包括:
1、增加大量新应用/扩展API
2、大量内核修改提升性能和稳定性
注: 访问错误的详细信息和链接可能保持受限,直至大多数用户更新与修复。这种情况通常发生于其他项目依赖的第三方库中存在bug但还没有修复的时候。
此更新包括51个安全修补程序。包括:Media、Skia过滤器、Vpxdecoder、PDFium的越界读取问题,V8引擎绑定、DOM、GIF解码器、Web数据库、Service WorkersUse-after-free问题,V8引擎绑定、V8引擎的类型混乱问题,WebGL的整数溢出问题,调试器中的验证问题,Blink、
Rendering的未初始化值的问题,通过代理的Cookies注入问题等。我们还要感谢所有参与我们在开发周期的工作的安全研究人员确保安全漏洞无法到达稳定的渠道像往常一样,我们正在进内部安全工作负责范围的广泛修补程序:
从内部审计的各种修正,模糊和其他措施等。

在 V8引擎 4.1 分支(目前 4.1.0.21)前端修复的多个漏洞。

(翻译来自Google & Bing,水平有限,如有错漏请见谅)

详细更新信息:

The Chrome team is delighted to announce the promotion of Chrome 41 to the stable channel for Windows, Mac and Linux. Chrome 41.0.2272.76 contains a number of fixes and improvements, including:
  • A number of new apps/extension APIs
  • Lots of under the hood changes for stability and performance
A list of changes is available in the log.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 51 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

[$7500][456516] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
[$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
[$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
[$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
[$3000][446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
[$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
[$2500][455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
[$2500][448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
[$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
[449610] High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP’s Zero Day Initiative.
[$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
[$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
[$1000][456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
[$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
[$1000][444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
[$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will be updated here when all reports have gone through the reward panel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:
  • [463349] CVE-2015-1231: Various fixes from internal audits, fuzzing and other initiatives.
  • Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch (currently 4.1.0.21).

Many of the above bugs were detected using AddressSanitizer or MemorySanitizer.

Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Penny MacNeil
Google Chrome

部分截图:

分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 分享淘帖 赞同赞同 反对反对

签到天数: 1570 天

[LV.Master]伴坛终老

推荐
 楼主| 发表于 2015-3-8 14:05:47 | 只看该作者
@@@ 发表于 2015-3-7 13:07
版主,更新时可否把Mac版本增加进去?

没有mac设备,我保存的程序是否可用都不知道

签到天数: 225 天

[LV.7]常住居民III

沙发
发表于 2015-3-4 22:49:37 | 只看该作者
不能自动更新,只有下载重新安装了,辛苦了

签到天数: 796 天

[LV.10]以坛为家III

板凳
发表于 2015-3-5 10:41:50 | 只看该作者
每次更新都来管理这...

签到天数: 174 天

[LV.7]常住居民III

4
发表于 2015-3-5 13:51:37 | 只看该作者
估计几天之后又会有小幅度的更新,不是因为别的,只因为 Adobe Flash Player 这个漏洞之王 ………… TMD,这货怎么还没有死呢?

签到天数: 1193 天

[LV.10]以坛为家III

5
发表于 2015-3-7 13:07:24 | 只看该作者
版主,更新时可否把Mac版本增加进去?

签到天数: 32 天

[LV.5]常住居民I

7
发表于 2016-5-10 06:28:36 | 只看该作者
强帖终于出现,要顶的啊,谢谢楼主
您需要登录后才可以回帖 登录 | 注册

本版积分规则

版权所有 © 2007-2015 软媒公司

站点统计|Archiver|IT之家

返回顶部