Visualizzazione Stampabile
-
[B]Google Chrome - 5.0.375.29[/B]
What's new in this version:
HTML5 Features: Geolocation, App Cache, web sockets, file drag-and-drop.
Integrated Flash Player Plugin
V8 performance improvements
Preferences synchronization
NaCl behind a flag.
Requirements:
Mac OS X 10.5.6 or later.
-
-
[B]Google Chrome - 5.0.396.0[/B]
What's new in this version:
The toolbar, omnibox and other UI changes reverted for Chrome 5 have been restored in this build.
Fixed bug related to scheme stripping that could cause URLs of the form "http://ftp.foo.com" to be misnavigated, by not stripping the scheme in this case.
Many bugs fixed relating to stripping "http://" and its interaction with the clipboard. Chrome should now prepend schemes onto the pasted text in a variety of situations.
Continual polish to main frame UI, including the bookmark bar.
Requirements:
Mac OS X 10.5.6 or later.
-
[B]Google Chrome - 6.0.401.1[/B]
What's new in this version:
Don't prepend scheme on copying an incomplete hostname.
Requirements:
Mac OS X 10.5.6 or later.
-
[B]Google Chrome - 5.0.375.55[/B]
What's new in this version:
[B]Google Chrome for Mac is being promoted out of beta to our stable channel[/B].
We believe that it provides not only the stability, performance and polish that every Mac user expects, but also a seamless native Mac application experience that Mac users will feel instantly at home with. Just like its Windows and Linux siblings, the stable version of Chrome for Mac comes with all the goodness of one of our biggest speed improvements to date. We've worked to make Chrome for Mac fast, fully-featured and extensible - with access to more than 4,500 extensions in the gallery. Some of Chrome for Mac's most-requested features are now available, including full-screen mode (just hit Command + Shift + F!), easy and powerful bookmark management, as well as the ability to synchronize not only bookmarks, but also browser preferences across computers.
Security Fixes: Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
Medium: Canonicalize URLs closer to the Safe Browsing specification. Credit to Brett Wilson of the Chromium development community.
High: Possible URL bar spoofing via unload event handlers. Credit to Michal Zalewski, Google Security Team.
Medium: Memory error in Safe Browsing interaction. Credit to Google Chrome Security Team (SkyLined).
Medium: Bypass of whitelist-mode plugin blocker. Credit to Darin Fisher of the Chromium development community.
Medium: Memory error with drag + drop. Credit to kuzzcc.
High: Incorrect execution of Javascript in the extension context. Credit to Andrey Kosyakov of the Chromium development community.
http://www.google.com/chrome
-
dalla versione 6 sono passati alla 5?
-
Citazione:
Originariamente Scritto da
palos
dalla versione 6 sono passati alla 5?
No, questa è la prima versione stabile, tutte le precedenti erano beta o "release candidate" con criteri di numerazione diversi e onestamente difficili da seguire.
-
e si in genere viene prima la 5 della 6 :)
-
[B]Google Chrome - 5.0.375.70[/B]
What's new in this version:
[B]Security fixes:[/B]
Medium: Cross-origin keystroke redirection. Credit to Michal Zalewski of Google Security Team.
High Cross-origin bypass in DOM methods. Credit to Sergey Glazunov.
High: Memory error in table layout. Credit to wushi of team509.
High: Linux sandbox escape. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Bitmap stale pointer. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in DOM node normalization. Credit to Mark Dowd under contract to Google Chrome Security Team.
High: Memory corruption in text transforms. Credit to wushi of team509.
Medium: XSS in innerHTML property of textarea. Credit to sirdarckcat of Google Security Team.
High: Memory corruption in font handling. Credit: Apple.
High: Geolocation events fire after document deletion. Credit to Google Chrome Security Team (Justin Schuh).
High: Memory corruption in rendering of list markers. Credit: Apple.
http://www.google.com/chrome?hl=it
-
Version 5.0.375.99:
Bug Fixes:
[LIST][*]42396] Low OOB read with WebGL. Credit to Sergey Glazunov; Google Chrome Security Team (SkyLined).[*][42575] [42980] Medium Isolate sandboxed iframes more strongly. Credit to sirdarckcat of Google Security Team.[*][$500] [43488] High Memory corruption with invalid SVGs. Credit to Aki Hekin of OUSPG; wushi of team509.[*][$500] [44424] High Memory corruption in bidi algorithm. Credit to wushi of team509.[*][45164] Low Crash with invalid image. Credit to javg0x83.[*][$1000] [45983] High Memory corruption with invalid PNG (libpng bug). Credit to Aki Helin of OUSPG.[*][$500] [46360] High Memory corruption in CSS style rendering. Credit to wushi of team509.[*][46575] Low Annoyance with print dialogs. Credit to Mats Ahlgren.[*][47056] Low Crash with modal dialogs. Credit to Aki Helin of OUSPG.[/LIST]
-
Versione 6 stabile
Version 6.0.472.53:
Updated UI
Form Autofill
Syncing of extensions and Autofill data
Increased speed and stability
-
Version 7.0.517.41
Hundreds of bug fixes
An updated HTML5 parser
File API
Directory upload via input tag
-
Versione 7.0.517.44
Bug Fixes:
[51602] High Use-after-free in text editing. Credit to David Bloom of the Google Security Team, Google Chrome Security Team (Inferno) and Google Chrome Security Team (Cris Neckar).
[$1000] [55257] High Memory corruption with enormous text area. Credit to wushi of team509.
[$1000] [58657] High Bad cast with the SVG use element. Credit to the kuzzcc.
[$1000] [58731] High Invalid memory read in XPath handling. Credit to Bui Quang Minh from Bkis (www.bkis.com).
[$500] [58741] High Use-after-free in text control selections. Credit to “vkouchna”.
[$1000] [Linux only] [59320] High Integer overflows in font handling. Credit to Aki Helin of OUSPG.
[$1000] [60055] High Memory corruption in libvpx. Credit to Christoph Diehl.
[$500] [60238] High Bad use of destroyed frame object. Credit to various developers, including “gundlach”.
[$500] [60327] [60769] [61255] High Type confusions with event objects. Credit to “fam.lam” and Google Chrome Security Team (Inferno).
[$1000] [60688] High Out-of-bounds array access in SVG handling. Credit to wushi of team509.
-
e' uscita la versione 8.0.522.215 stabile
The Chrome team is happy to announce our latest Stable release, 8.0.552.215. In addition to the over 800 bug fixes and stability improvements, Chrome 8 now contains a built in PDF viewer that is secured in Chrome’s sandbox. As always, it also contains our latest security fixes, listed below. This release will also be posted to the Beta Channel.
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.
[17655] Low Possible pop-up blocker bypass. Credit to Google Chrome Security Team (SkyLined).
[55745] Medium Cross-origin video theft with canvas. Credit to Nirankush Panchbhai and Microsoft Vulnerability Research (MSVR).
[56237] Low Browser crash with HTML5 databases. Credit to Google Chrome Security Team (Inferno).
[58319] Low Prevent excessive file dialogs, possibly leading to browser crash. Credit to Cezary Tomczak (gosu.pl).
[$500] [59554] High Use after free in history handling. Credit to Stefan Troger.
[Linux / Mac] [59817] Medium Make sure the “dangerous file types” list is uptodate with the Windows platforms. Credit to Billy Rios of the Google Security Team.
[61701] Low Browser crash with HTTP proxy authentication. Credit to Mohammed Bouhlel.
[61653] Medium Out-of-bounds read regression in WebM video support. Credit to Google Chrome Security Team (Chris Evans), based on earlier testcases from Mozilla and Microsoft (MSVR).
[$1000] [62127] High Crash due to bad indexing with malformed video. Credit to miaubiz.
[62168] Medium Possible browser memory corruption via malicious privileged extension. Credit to kuzzcc.
[$1000] [62401] High Use after free with SVG animations. Credit to Sławomir Błażek.
[$500] [63051] Medium Use after free in mouse dragging event handling. Credit to kuzzcc.
[$1000] [63444] High Double free in XPath handling. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Sciences.
-
Version 22.0.1229.92: https://www.google.com/intl/en/chrome/browser/
[LIST][*]contains a number of stability fixes, including an issue with multiple profiles on Mac OS X 10.8.2.[*]It also contains a fix for text display on the Mac[*]security updates listed below:
[LIST][*][$1000] [138208] High CVE-2012-2900: Crash in Skia text rendering. Credit to Atte Kettunen of OUSPG.[*][$3133.7] [147499] Critical CVE-2012-5108: Race condition in audio device handling. Credit to Atte Kettunen of OUSPG.[*][$500] [148692] Medium CVE-2012-5109: OOB read in ICU regex. Credit to Arthur Gerkis.[*][151449] Medium CVE-2012-5110: Out-of-bounds read in compositor. Credit to Google Chrome Security Team (Inferno).[*][151895] Low CVE-2012-5111: Plug-in crash monitoring was missing for Pepper plug-ins. Credit to Google Chrome Security Team (Chris Evans).[/LIST][/LIST]
-
Version 22.0.1229.94:
Aggiornamento di sicurezza