Today we are happy to release a stable release of the new version of Chrome, based on the beta version released a month ago. This release contains two important technologies that will allow developers to create even more powerful web applications and games:
Web Audio API
Web Audio API allows developers to add a
variety of sound effects , such as simulating the acoustics of a room or any other space.
')
Native client
Native Client is an open-source technology that allows you to run C and C ++ code that will be easily and safely executed in the sandbox of the browser. Currently, the Native Client only supports applications presented in the Chrome online store (
Chrome Web Store ), but we are working to eliminate this limitation as soon as possible.
This release also contains some changes for our users working with Mac OS X Lion. Now for all pages, Chrome uses
the Lion scroll bars that appear only during scrolling. We also added support for
full-screen mode - it can be turned on with a button or with a combination of Ctrl + Shift + F. Finally, we fixed a lot of bugs and bugs, and also added several visual buns.
The list of those bugs that found their hard workers and the lucky ones, as well as the amount of their rewards under the cut. Motivate, comrades.
- [49377] High CVE-2011-2835: Race condition in the certificate cache. Credit to Ryan Sleevi of the Chromium development community.
- [51464] Low CVE-2011-2836: Infobar for Windows Flash Player. Credit to electronixtar.
- [Linux only] [57908] Low CVE-2011-2837: Use PIC / pie compiler flags. Credit to wbrana.
- [75070] Low CVE-2011-2838: Treat MIME type more authoritatively when loading plug-ins. Credit to Michal Zalewski of the Google Security Team.
- [76771] High CVE-2011-2839: Crash in v8 script object wrappers. Credit to Kostya Serebryany of the Chromium development community.
- [78427] [83031] Low CVE-2011-2840: Possible URL bar spoofs with unusual user interaction. Credit to kuzzcc.
- [$ 500] [78639] High CVE-2011-2841: Garbage collection error in PDF. Credit to Mario Gomes.
- [Mac only] [80680] Low CVE-2011-2842: Mac installer. Credit to Aaron Sigel of vtty.com.
- [82438] Medium CVE-2011-2843: Out-of-bounds read with media buffers. Credit to Kostya Serebryany of the Chromium development community.
- [85041] Medium CVE-2011-2844: Out-of-bounds read with mp3 files. Credit to Mario Gomes.
- [$ 1000] [89219] High CVE-2011-2846: Use-after-free in unload event handling. Credit to Arthur Gerkis.
- [$ 1000] [89330] High CVE-2011-2847: Use-after-free in document loader. Credit to miaubiz.
- [$ 500] [89564] Medium CVE-2011-2848: URL bar spoof with forward button. Credit to Jordi Chancel.
- [89795] Low CVE-2011-2849: Browser NULL pointer crash with WebSockets. Credit to Arthur Gerkis.
- [$ 500] [89991] Medium CVE-2011-3234: Out-of-bounds read in box handling. Credit to miaubiz.
- [90134] Medium CVE-2011-2850: Out-of-bounds read with Khmer characters. Credit to miaubiz.
- [90173] Medium CVE-2011-2851: Out-of-bounds read in video handling. Credit to Google Chrome Security Team (Inferno).
- [$ 500] [91120] High CVE-2011-2852: Off-by-one in v8. Credit to Christian Holler.
- [91197] High CVE-2011-2853: Use-after-free in plug-in handling. Credit to Google Chrome Security Team (SkyLined).
- [$ 1000] [92651] [94800] High CVE-2011-2854: Use-after-free in ruby / table style handing. Credit to Sławomir Błażek, and independent later Google Chrome Security Team (Inferno).
- [$ 1000] [92959] High CVE-2011-2855: Stale node in stylesheet handling. Credit to Arthur Gerkis.
- [$ 2000] [93416] High CVE-2011-2856: Cross-origin bypass in v8. Credit to Daniel Divricean.
- [$ 1000] [93420] High CVE-2011-2857: Use-after-free in focus controller. Credit to miaubiz.
- [$ 1000] [93472] High CVE-2011-2834: Double free in libxml XPath handling. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Scences.
- [93497] Medium CVE-2011-2859: Incorrect permissions assigned to non-gallery pages. Credit to Bernhard 'Bruhns' Brehm of Recurity Labs.
- [$ 1000] [93587] High CVE-2011-2860: Use-after-free in table style handling. Credit to miaubiz.
- [93596] Medium CVE-2011-2861: Bad string read in PDF. Credit to Aki Helin of OUSPG.
- [$ 2337] [93906] High CVE-2011-2862: Unintended access to v8 built-in objects. Credit to Sergey Glazunov.
- [95563] Medium CVE-2011-2864: Out-of-bounds read with Tibetan characters. Credit to Google Chrome Security Team (Inferno).
- [95625] Medium CVE-2011-2858: Out-of-bounds read with triangle arrays. Credit to Google Chrome Security Team (Inferno).
- [95917] Low CVE-2011-2874: Failure to pin a self-signed cert for a session. Credit to Nishant Yadant of VMware and Craig Chamberlain (@randomuserid).
- [$ 1000] [95920] High CVE-2011-2875: Type confusion in v8 object sealing. Credit to Christian Holler.
As usual, if you already have Chrome installed, it will be automatically updated to the new version in the near future. If you are still not using Chrome, you can download it from
www.google.com/chrome .