Google Chrome 11.0.696.57 Stable, adds support for HTML5 speech input

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab. Desktop shortcuts allow you to launch your favorite Web apps straight from your desktop.

Google Chrome 11 contains some really great improvements including speech input through HTML5.

Google Chrome Stable Update
Google Chrome 11.0.696.57 has been released to the Stable channel for Windows, Mac, Linux, and Chrome Frame. This release added support for HTML5 speech input, as well as the security fixes listed in What's new in Google Chrome 11.0.696.57 Stable section.

Download Google Chrome
You can download Google Chrome 11.0.696.57 Stable Channel standalone offline installer from website Download Google Chrome 11.0.696.57 Stable channel or install from website http://www.google.com/chrome

Google Chrome 11.0.696.57 Stable

What's new in Google Chrome 11.0.696.57 Stable
Google Chrome 11.0.696.57 contains fixes the following security issues:
  • [61502]: CVE-2011-1303: Stale pointer in floating object handling. Credit to Scott Hess of the Chromium development community and Martin Barbella. (High)
  • [70538]: CVE-2011-1304: Pop-up block bypass via plug-ins. Credit to Chamal De Silva. (Low)
  • [Linux / Mac only] [70589]: CVE-2011-1305: Linked-list race in database handling. Credit to Kostya Serebryany of the Chromium development community. (Medium)
  • [71586]: CVE-2011-1434: Lack of thread safety in MIME handling. Credit to Aki Helin. [$500] (Medium)
  • [72523]: CVE-2011-1435: Bad extension with ‘tabs’ permission can capture local files. Credit to Cole Snodgrass. (Medium)
  • [Linux only] [72910]: CVE-2011-1436: Possible browser crash due to bad interaction with X. Credit to miaubiz. (Low)
  • [73526]: CVE-2011-1437: Integer overflows in float rendering. Credit to miaubiz. [$1000] (High)
  • [74653]: CVE-2011-1438: Same origin policy violation with blobs. Credit to kuzzcc. [$1000] (High)
  • [Linux only] [74763]: CVE-2011-1439: Prevent interference between renderer processes. Credit to Julien Tinnes of the Google Security Team. (High)
  • [75186]: CVE-2011-1440: Use-after-free with tag and CSS. Credit to Jose A. Vazquez. [$1000] (High)
  • [75347]: CVE-2011-1441: Bad cast with floating select lists. Credit to Michael Griffiths. [$500] (High)
  • [75801]: CVE-2011-1442: Corrupt node trees with mutation events. Credit to Sergey Glazunov and wushi of team 509. [$1000] (High)
  • [76001]: CVE-2011-1443: Stale pointers in layering code. Credit to Martin Barbella. [$1000] (High)
  • [Linux only] [76542]: CVE-2011-1444: Race condition in sandbox launcher. Credit to Dan Rosenberg. [$500] (High)
  • [76646]: CVE-2011-1445: Out-of-bounds read in SVG. Credit to wushi of team509. (Medium)
  • [76666] [77507] [78031]: CVE-2011-1446: Possible URL bar spoofs with navigation errors and interrupted loads. Credit to kuzzcc. [$3000] (High)
  • [76966]: CVE-2011-1447: Stale pointer in drop-down list handling. Credit to miaubiz. [$1000] (High)
  • [77130]: CVE-2011-1448: Stale pointer in height calculations. Credit to wushi of team509. [$1000] (High)
  • [77346]: CVE-2011-1449: Use-after-free in WebSockets. Credit to Marek Majkowski. [$1000] (High)
  • [77349]: CVE-2011-1450: Dangling pointers in file dialogs. Credit to kuzzcc.
  • [77463]: CVE-2011-1451: Dangling pointers in DOM id map. Credit to Sergey Glazunov. [$2000] (High)
  • [77786]: CVE-2011-1452: URL bar spoof with redirect and manual reload. Credit to Jordi Chancel. [$500] (Medium)
  • [79199]: CVE-2011-1454: Use-after-free in DOM id handling. Credit to Sergey Glazunov. [$1500] (High)
  • [79361]: CVE-2011-1455: Out-of-bounds read with multipart-encoded PDF. Credit to Eric Roman of the Chromium development community. (Medium)
  • [79364]: CVE-2011-1456: Stale pointers with PDF forms. Credit to Eric Roman of the Chromium development community. (High)

Source: Google Chrome Releases

No comments: