Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新) - Win8.1 & Win8 资源区 IT之家论坛
找回密码 注册
查看: 7528|回复: 6
打印 上一主题 下一主题

[网络软件] Google Chrome 41.0.2272.76 Stable 提升性能和稳定性 (3.04更新)


签到天数: 1570 天


发表于 2015-3-4 14:04:22 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式


您需要 登录 才可以下载或查看,没有帐号?注册

本帖最后由 TianLi520 于 2015-3-8 14:06 编辑

Google Chrome稳定版发布大版本更新,版本号更新为41.0.2272.76

Chrome团队很高兴地宣布适用于Windows,Mac和Linux的Chrome 41稳定版发布。Chrome 41.0.2272.76 包含大量的修正和改进,其中包括:
注: 访问错误的详细信息和链接可能保持受限,直至大多数用户更新与修复。这种情况通常发生于其他项目依赖的第三方库中存在bug但还没有修复的时候。
此更新包括51个安全修补程序。包括:Media、Skia过滤器、Vpxdecoder、PDFium的越界读取问题,V8引擎绑定、DOM、GIF解码器、Web数据库、Service WorkersUse-after-free问题,V8引擎绑定、V8引擎的类型混乱问题,WebGL的整数溢出问题,调试器中的验证问题,Blink、

在 V8引擎 4.1 分支(目前前端修复的多个漏洞。

(翻译来自Google & Bing,水平有限,如有错漏请见谅)


The Chrome team is delighted to announce the promotion of Chrome 41 to the stable channel for Windows, Mac and Linux. Chrome 41.0.2272.76 contains a number of fixes and improvements, including:
  • A number of new apps/extension APIs
  • Lots of under the hood changes for stability and performance
A list of changes is available in the log.

Security Fixes and Rewards

Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.

This update includes 51 security fixes. Below, we highlight fixes that were contributed by external researchers. Please see the Chromium security page for more information.

[$7500][456516] High CVE-2015-1212: Out-of-bounds write in media. Credit to anonymous.
[$5000][448423] High CVE-2015-1213: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445810] High CVE-2015-1214: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$5000][445809] High CVE-2015-1215: Out-of-bounds write in skia filters. Credit to cloudfuzzer.
[$4000][454954] High CVE-2015-1216: Use-after-free in v8 bindings. Credit to anonymous.
[$3000][456192] High CVE-2015-1217: Type confusion in v8 bindings. Credit to anonymous.
[$3000][456059] High CVE-2015-1218: Use-after-free in dom. Credit to cloudfuzzer.
[$3000][446164] High CVE-2015-1219: Integer overflow in webgl. Credit to Chen Zhang (demi6od) of NSFOCUS Security Team.
[$3000][437651] High CVE-2015-1220: Use-after-free in gif decoder. Credit to Aki Helin of OUSPG.
[$2500][455368] High CVE-2015-1221: Use-after-free in web databases. Credit to Collin Payne.
[$2500][448082] High CVE-2015-1222: Use-after-free in service workers. Credit to Collin Payne.
[$2000][454231] High CVE-2015-1223: Use-after-free in dom. Credit to Maksymillian Motyl.
[449610] High CVE-2015-1230: Type confusion in v8. Credit to Skylined working with HP’s Zero Day Initiative.
[$2000][449958] Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. Credit to Aki Helin of OUSPG.
[$1000][446033] Medium CVE-2015-1225: Out-of-bounds read in pdfium. Credit to cloudfuzzer.
[$1000][456841] Medium CVE-2015-1226: Validation issue in debugger. Credit to Rob Wu.
[$1000][450389] Medium CVE-2015-1227: Uninitialized value in blink. Credit to Christoph Diehl.
[$1000][444707] Medium CVE-2015-1228: Uninitialized value in rendering. Credit to miaubiz.
[$500][431504] Medium CVE-2015-1229: Cookie injection via proxies. Credit to iliwoy.

We would also like to thank all security researchers that worked with us during the development cycle to prevent security bugs from ever reaching the stable channel. The total value of additional rewards and their recipients will be updated here when all reports have gone through the reward panel.

As usual, our ongoing internal security work was responsible for a wide range of fixes:
  • [463349] CVE-2015-1231: Various fixes from internal audits, fuzzing and other initiatives.
  • Multiple vulnerabilities in V8 fixed at the tip of the 4.1 branch (currently

Many of the above bugs were detected using AddressSanitizer or MemorySanitizer.

Interested in switching release channels? Find out how. If you find a new issue, please let us know by filing a bug.

Penny MacNeil
Google Chrome


分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 分享淘帖 赞同赞同 反对反对

签到天数: 1570 天


 楼主| 发表于 2015-3-8 14:05:47 | 只看该作者
@@@ 发表于 2015-3-7 13:07


签到天数: 225 天


发表于 2015-3-4 22:49:37 | 只看该作者

签到天数: 796 天


发表于 2015-3-5 10:41:50 | 只看该作者

签到天数: 174 天


发表于 2015-3-5 13:51:37 | 只看该作者
估计几天之后又会有小幅度的更新,不是因为别的,只因为 Adobe Flash Player 这个漏洞之王 ………… TMD,这货怎么还没有死呢?

签到天数: 1193 天


发表于 2015-3-7 13:07:24 | 只看该作者

签到天数: 32 天


发表于 2016-5-10 06:28:36 | 只看该作者
您需要登录后才可以回帖 登录 | 注册


版权所有 © 2007-2015 软媒公司