자 료 실

서버 / IT Google Chrome 22.0.1229.79 Stable

2012.09.26 10:14

마이크로닉스 조회:5944

https://dl.google.com/chrome/win/22.0.1229.79_chrome_installer.exe


업데이트되더니 설정의 몽키스패너가 사라졌네요. 다른 아이콘을 바뀌었습니다.


더불어 크롬정보 페이지도 작은창으로 열리던것이 새탭으로 표시되네요.


Stable Channel Update

Tuesday, September 25, 2012 | 10:50

Labels: Beta updates, Stable updates

The Chrome Team is excited to announce the promotion of Chrome 22 to the stable channel.  Chrome 22.0.1229.79 (also now available on the beta channel) has a number of new and exciting updates including: 
  • Mouse Lock API availability for Javascript
  • Additional Windows 8 enhancements
  • Continued polish for users of HiDPI/Retina screens
You can find out more about Chrome 22 on the Official Chrome Blog.

Security fixes and rewards:

Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.

Occasionally, we issue special rewards for bugs outside of Chrome, particularly where the bug is very severe and/or we are able to partially work around the issue:

  • [$5000] [146254] Critical CVE-2012-2897: Windows kernel memory corruption. Credit to Eetu Luodemaa and Joni V?h?m?ki, both from Documill.

And back to your regular scheduled rewards, including some at the new higher levels:

  • [$10000] [143439] High CVE-2012-2889: UXSS in frame handling. Credit to Sergey Glazunov.
  • [$5000] [143437] High CVE-2012-2886: UXSS in v8 bindings. Credit to Sergey Glazunov.
  • [$2000] [139814] High CVE-2012-2881: DOM tree corruption with plug-ins. Credit to Chamal de Silva.
  • [$1000] [135432] High CVE-2012-2876: Buffer overflow in SSE2 optimizations. Credit to Atte Kettunen of OUSPG.
  • [$1000] [140803] High CVE-2012-2883: Out-of-bounds write in Skia. Credit to Atte Kettunen of OUSPG.
  • [$1000] [143609] High CVE-2012-2887: Use-after-free in onclick handling. Credit to Atte Kettunen of OUSPG.
  • [$1000] [143656] High CVE-2012-2888: Use-after-free in SVG text references. Credit to miaubiz.
  • [$1000] [144899] High CVE-2012-2894: Crash in graphics context handling. Credit to Sławomir Bła?ek.
  • [Mac only] [$1000] [145544] High CVE-2012-2896: Integer overflow in WebGL. Credit to miaubiz.
  • [$500] [137707] Medium CVE-2012-2877: Browser crash with extensions and modal dialogs. Credit to Nir Moshe.
  • [$500] [139168] Low CVE-2012-2879: DOM topology corruption. Credit to pawlkt.
  • [$500] [141651] Medium CVE-2012-2884: Out-of-bounds read in Skia. Credit to Atte Kettunen of OUSPG.
  • [132398] High CVE-2012-2874: Out-of-bounds write in Skia. Credit to Google Chrome Security Team (Inferno).
  • [134955] [135488] [137106] [137288] [137302] [137547] [137556] [137606] [137635] [137880] [137928] [144579] [145079] [145121] [145163] [146462] Medium CVE-2012-2875: Various lower severity issues in the PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
  • [137852] High CVE-2012-2878: Use-after-free in plug-in handling. Credit to Fermin Serna of Google Security Team.
  • [139462] Medium CVE-2012-2880: Race condition in plug-in paint buffer. Credit to Google Chrome Security Team (Cris Neckar).
  • [140647] High CVE-2012-2882: Wild pointer in OGG container handling. Credit to Google Chrome Security Team (Inferno).
  • [142310] Medium CVE-2012-2885: Possible double free on exit. Credit to the Chromium development community.
  • [143798] [144072] [147402] High CVE-2012-2890: Use-after-free in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
  • [144051] Low CVE-2012-2891: Address leak over IPC. Credit to Lei Zhang of the Chromium development community.
  • [144704] Low CVE-2012-2892: Pop-up block bypass. Credit to Google Chrome Security Team (Cris Neckar).
  • [144799] High CVE-2012-2893: Double free in XSL transforms. Credit to Google Chrome Security Team (Cris Neckar).
  • [145029] [145157] [146460] High CVE-2012-2895: Out-of-bounds writes in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.

Many of the above bugs were detected using AddressSanitizer.

We’d also like to thank Arthur Gerkis for working with us during the development cycle and preventing security regressions from ever reaching the stable channel.

Full details about what's in this release are available in the SVN revision log. Found a bug? Report it! On a different channel, but want to join us on the Beta train? The Chromium wiki has you covered.

Jason Kersey
Google Chrome

번호 제목 글쓴이 조회 추천 등록일
[공지] 저작권 보호 요청 자료 목록 gooddew - - -
[공지] 자료실 이용간 유의사항 gooddew - - -
788 유틸리티| 120925 동작 트래커 및 ipfilter [19] 틸스 15726 42 09-25
787 유틸리티| Windows 7 USB DVD Download Tool [20] gooddew 22959 4 09-25
786 서버 / IT| 파폭 페일문 64비트 15.1.1 우금티버전(포터블) [13] 우금티 7320 6 09-24
785 윈도우 / PE| OnThreeSeas Personalization_3.2 ko [30] 제나비 9728 8 09-24
784 유틸리티| Free Alarm Clock [2] 라스트ID 5804 3 09-23
783 유틸리티| timebell 9 알람 [6] Sendal 4510 1 09-23
782 윈도우 / PE| win8 에어로 기능 활성화 되는 소스입니다. [9] 국재호 13350 1 09-23
781 Portable Kirara Encoder v9.3 [2] 료마 4689 3 09-23
780 윈도우 / PE| 요청하신 VHD 설치 만들기 동영상 [10] 보람 8468 5 09-23
779 윈도우 / PE| Grub4Dos로 USB 멀티부팅 메뉴 만들기 동영상 [14] 보람 13151 10 09-23
778 TuneUp-13.0.2020.14 [7] 천국문 5895 4 09-22
777 윈도우 / PE| MICROSOFT SERVER CONVERTER 2012 [20] 신지 9094 5 09-22
776 서버 / IT| Pale Moon v15.1.1 [7] Waffen-SS 6425 4 09-21
775 유틸리티| Install Factory 7 [인스톨 팩토리 7] [8] 핑크맛우유 11644 4 09-20
774 서버 / IT| Google Chrome & Chromium & SRWare Iron & Co... [5] Waffen-SS 8914 4 09-20
773 Portable Kirara Encoder v9.1.135(64bit) v9.1.136(32bit) [4] 료마 5066 3 09-20
772 서버 / IT| Firefox & Pale Moon & Waterfox [7] Waffen-SS 7176 2 09-20
771 유틸리티| 골드메모리 테스트 (펌) [8] 라스트ID 6809 3 09-19
770 유틸리티| Paragon Hard Disk Manager 12 Professional v10.0.19.1517... [24] UCLA 6650 3 09-19
769 유틸리티| Visual_Assist.X_v10.7.1903 [6] hwanjung 4009 0 09-18
XE1.11.6 Layout1.4.8