Chrome
-
Votantonio
- Oracolo di Mac Peer
- Posts: 4094
- Joined: Tue May 13, 2008 3:30 am
Google Chrome - 5.0.375.70
What's new in this version:
Security fixes:
Medium: Cross-origin keystroke redirection. Credit to Michal Zalewski of Google Security Team.
High Cross-origin bypass in DOM methods. Credit to Sergey Glazunov.
High: Memory error in table layout. Credit to wushi of team509.
High: Linux sandbox escape. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Bitmap stale pointer. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in DOM node normalization. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in text transforms. Credit to wushi of team509.
Medium: XSS in innerHTML property of textarea. Credit to sirdarckcat of Google Security Team.
High: Memory corruption in font handling. Credit: Apple.
High: Geolocation events fire after document deletion. Credit to Google Chrome Security Team (Justin Schuh).
High: Memory corruption in rendering of list markers. Credit: Apple.
http://www.google.com/chrome?hl=it
What's new in this version:
Security fixes:
Medium: Cross-origin keystroke redirection. Credit to Michal Zalewski of Google Security Team.
High Cross-origin bypass in DOM methods. Credit to Sergey Glazunov.
High: Memory error in table layout. Credit to wushi of team509.
High: Linux sandbox escape. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Bitmap stale pointer. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in DOM node normalization. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in text transforms. Credit to wushi of team509.
Medium: XSS in innerHTML property of textarea. Credit to sirdarckcat of Google Security Team.
High: Memory corruption in font handling. Credit: Apple.
High: Geolocation events fire after document deletion. Credit to Google Chrome Security Team (Justin Schuh).
High: Memory corruption in rendering of list markers. Credit: Apple.
http://www.google.com/chrome?hl=it
- Padmé Amidala
- Posts: 7607
- Joined: Sun Apr 15, 2007 1:14 am
Version 5.0.375.99:
Bug Fixes:
Bug Fixes:
- 42396] Low OOB read with WebGL. Credit to Sergey Glazunov; Google Chrome Security Team (SkyLined).
- [42575] [42980] Medium Isolate sandboxed iframes more strongly. Credit to sirdarckcat of Google Security Team.
- [$500] [43488] High Memory corruption with invalid SVGs. Credit to Aki Hekin of OUSPG; wushi of team509.
- [$500] [44424] High Memory corruption in bidi algorithm. Credit to wushi of team509.
- [45164] Low Crash with invalid image. Credit to javg0x83.
- [$1000] [45983] High Memory corruption with invalid PNG (libpng bug). Credit to Aki Helin of OUSPG.
- [$500] [46360] High Memory corruption in CSS style rendering. Credit to wushi of team509.
- [46575] Low Annoyance with print dialogs. Credit to Mats Ahlgren.
- [47056] Low Crash with modal dialogs. Credit to Aki Helin of OUSPG.
- Padmé Amidala
- Posts: 7607
- Joined: Sun Apr 15, 2007 1:14 am
- Padmé Amidala
- Posts: 7607
- Joined: Sun Apr 15, 2007 1:14 am
- Padmé Amidala
- Posts: 7607
- Joined: Sun Apr 15, 2007 1:14 am
Versione 7.0.517.44
Bug Fixes:
[51602] High Use-after-free in text editing. Credit to David Bloom of the Google Security Team, Google Chrome Security Team (Inferno) and Google Chrome Security Team (Cris Neckar).
[$1000] [55257] High Memory corruption with enormous text area. Credit to wushi of team509.
[$1000] [58657] High Bad cast with the SVG use element. Credit to the kuzzcc.
[$1000] [58731] High Invalid memory read in XPath handling. Credit to Bui Quang Minh from Bkis (www.bkis.com).
[$500] [58741] High Use-after-free in text control selections. Credit to “vkouchna”.
[$1000] [Linux only] [59320] High Integer overflows in font handling. Credit to Aki Helin of OUSPG.
[$1000] [60055] High Memory corruption in libvpx. Credit to Christoph Diehl.
[$500] [60238] High Bad use of destroyed frame object. Credit to various developers, including “gundlach”.
[$500] [60327] [60769] [61255] High Type confusions with event objects. Credit to “fam.lam” and Google Chrome Security Team (Inferno).
[$1000] [60688] High Out-of-bounds array access in SVG handling. Credit to wushi of team509.
Bug Fixes:
[51602] High Use-after-free in text editing. Credit to David Bloom of the Google Security Team, Google Chrome Security Team (Inferno) and Google Chrome Security Team (Cris Neckar).
[$1000] [55257] High Memory corruption with enormous text area. Credit to wushi of team509.
[$1000] [58657] High Bad cast with the SVG use element. Credit to the kuzzcc.
[$1000] [58731] High Invalid memory read in XPath handling. Credit to Bui Quang Minh from Bkis (www.bkis.com).
[$500] [58741] High Use-after-free in text control selections. Credit to “vkouchna”.
[$1000] [Linux only] [59320] High Integer overflows in font handling. Credit to Aki Helin of OUSPG.
[$1000] [60055] High Memory corruption in libvpx. Credit to Christoph Diehl.
[$500] [60238] High Bad use of destroyed frame object. Credit to various developers, including “gundlach”.
[$500] [60327] [60769] [61255] High Type confusions with event objects. Credit to “fam.lam” and Google Chrome Security Team (Inferno).
[$1000] [60688] High Out-of-bounds array access in SVG handling. Credit to wushi of team509.
e' uscita la versione 8.0.522.215 stabile
The Chrome team is happy to announce our latest Stable release, 8.0.552.215. In addition to the over 800 bug fixes and stability improvements, Chrome 8 now contains a built in PDF viewer that is secured in Chrome’s sandbox. As always, it also contains our latest security fixes, listed below. This release will also be posted to the Beta Channel.
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
[17655] Low Possible pop-up blocker bypass. Credit to Google Chrome Security Team (SkyLined).
[55745] Medium Cross-origin video theft with canvas. Credit to Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR).
[56237] Low Browser crash with HTML5 databases. Credit to Google Chrome Security Team (Inferno).
[58319] Low Prevent excessive file dialogs, possibly leading to browser crash. Credit to Cezary Tomczak (gosu.pl).
[$500] [59554] High Use after free in history handling. Credit to Stefan Troger.
[Linux / Mac] [59817] Medium Make sure the “dangerous file types” list is uptodate with the Windows platforms. Credit to Billy Rios of the Google Security Team.
[61701] Low Browser crash with HTTP proxy authentication. Credit to Mohammed Bouhlel.
[61653] Medium Out-of-bounds read regression in WebM video support. Credit to Google Chrome Security Team (Chris Evans), based on earlier testcases from Mozilla and Microsoft (MSVR).
[$1000] [62127] High Crash due to bad indexing with malformed video. Credit to miaubiz.
[62168] Medium Possible browser memory corruption via malicious privileged extension. Credit to kuzzcc.
[$1000] [62401] High Use after free with SVG animations. Credit to Sławomir Błażek.
[$500] [63051] Medium Use after free in mouse dragging event handling. Credit to kuzzcc.
[$1000] [63444] High Double free in XPath handling. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Sciences.
The Chrome team is happy to announce our latest Stable release, 8.0.552.215. In addition to the over 800 bug fixes and stability improvements, Chrome 8 now contains a built in PDF viewer that is secured in Chrome’s sandbox. As always, it also contains our latest security fixes, listed below. This release will also be posted to the Beta Channel.
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
[17655] Low Possible pop-up blocker bypass. Credit to Google Chrome Security Team (SkyLined).
[55745] Medium Cross-origin video theft with canvas. Credit to Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR).
[56237] Low Browser crash with HTML5 databases. Credit to Google Chrome Security Team (Inferno).
[58319] Low Prevent excessive file dialogs, possibly leading to browser crash. Credit to Cezary Tomczak (gosu.pl).
[$500] [59554] High Use after free in history handling. Credit to Stefan Troger.
[Linux / Mac] [59817] Medium Make sure the “dangerous file types” list is uptodate with the Windows platforms. Credit to Billy Rios of the Google Security Team.
[61701] Low Browser crash with HTTP proxy authentication. Credit to Mohammed Bouhlel.
[61653] Medium Out-of-bounds read regression in WebM video support. Credit to Google Chrome Security Team (Chris Evans), based on earlier testcases from Mozilla and Microsoft (MSVR).
[$1000] [62127] High Crash due to bad indexing with malformed video. Credit to miaubiz.
[62168] Medium Possible browser memory corruption via malicious privileged extension. Credit to kuzzcc.
[$1000] [62401] High Use after free with SVG animations. Credit to Sławomir Błażek.
[$500] [63051] Medium Use after free in mouse dragging event handling. Credit to kuzzcc.
[$1000] [63444] High Double free in XPath handling. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Sciences.
MacBook 2,16GHz Intel Core 2 Duo
2 GB 667 MHz DDR2 SDRAM
MAC OS X 10.6.6
I-POD NANO 3G 8GB firmware 1.1.3
I-POD CLASSIC PHOTO 4G 60GB firmware 1.2.1
2 GB 667 MHz DDR2 SDRAM
MAC OS X 10.6.6
I-POD NANO 3G 8GB firmware 1.1.3
I-POD CLASSIC PHOTO 4G 60GB firmware 1.2.1
Version 22.0.1229.92: https://www.google.com/intl/en/chrome/browser/
- contains a number of stability fixes, including an issue with multiple profiles on Mac OS X 10.8.2.
- It also contains a fix for text display on the Mac
- security updates listed below:
- [$1000] [138208] High CVE-2012-2900: Crash in Skia text rendering. Credit to Atte Kettunen of OUSPG.
- [$3133.7] [147499] Critical CVE-2012-5108: Race condition in audio device handling. Credit to Atte Kettunen of OUSPG.
- [$500] [148692] Medium CVE-2012-5109: OOB read in ICU regex. Credit to Arthur Gerkis.
- [151449] Medium CVE-2012-5110: Out-of-bounds read in compositor. Credit to Google Chrome Security Team (Inferno).
- [151895] Low CVE-2012-5111: Plug-in crash monitoring was missing for Pepper plug-ins. Credit to Google Chrome Security Team (Chris Evans).
Chi copia è un cialtrone. Digli di smettere! - Gianni Cresci
- Padmé Amidala
- Posts: 7607
- Joined: Sun Apr 15, 2007 1:14 am