Google Chrome 13.0.782.107 has been released to the Stable channel

Google Chrome Stable Update
Google Chrome 13.0.782.107 has been released to the Stable channel for Windows, Mac, Linux, and Chrome Frame. This vesion is the first stable release of the Google Chrome major version 13.0. This release contains a number of new features and updates, as well as the security fixes listed in What's new in Google Chrome 13.0.782.107 Stable section.

Overview
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites, access your favorite pages instantly with lightning speed from any new tab. Desktop shortcuts allow you to launch your favorite Web apps straight from your desktop.

Download Google Chrome
To install Google Chrome 13.0.782.107 Stable please visit http://www.google.com/chrome website.

What's new in Google Chrome 13.0.782.107 Stable
Chrome 13.0.782.107 contains a number of new features and updates, including:
  • Instant Pages prerendering technology.
  • Print Preview.
  • New Omnibox.

Security fixes and rewards:
  • [75821] CVE-2011-2358: Always confirm an extension install via a browser dialog. Credit to Sergey Glazunov. (Medium)
  • [78841] CVE-2011-2359: Stale pointer due to bad line box tracking in rendering. Credit to miaubiz and Martin Barbella. [$1000 each] (High)
  • [79266] CVE-2011-2360: Potential bypass of dangerous file prompt. Credit to kuzzcc. (Low)
  • [79426] CVE-2011-2361: Improve designation of strings in the basic auth dialog. Credit to kuzzcc. (Low)
  • [Linux only] [81307] CVE-2011-2782: File permissions error with drag and drop. Credit to Evan Martin of the Chromium development community. (Medium)
  • [83273] CVE-2011-2783: Always confirm a developer mode NPAPI extension install via a browser dialog. Credit to Sergey Glazunov. (Medium)
  • [83841] CVE-2011-2784: Local file path disclosure via GL program log. Credit to kuzzcc. (Low)
  • [84402] CVE-2011-2785: Sanitize the homepage URL in extensions. Credit to kuzzcc. (Low)
  • [84600] CVE-2011-2786: Make sure the speech input bubble is always on-screen. Credit to Olli Pettay of Mozilla. (Low)
  • [84805] CVE-2011-2787: Browser crash due to GPU lock re-entrancy issue. Credit to kuzzcc. (Medium)
  • [85559] CVE-2011-2788: Buffer overflow in inspector serialization. Credit to Mikołaj Małecki. (Low)
  • [85808] CVE-2011-2789: Use after free in Pepper plug-in instantiation. Credit to Mario Gomes and kuzzcc. [$500 each] (Medium)
  • [86502] CVE-2011-2790: Use-after-free with floating styles. Credit to miaubiz. [$1000] (High)
  • [86900] CVE-2011-2791: Out-of-bounds write in ICU. Credit to Yang Dingning from NCNIPC, Graduate University of Chinese Academy of Sciences. [$1000] (High)
  • [87148] CVE-2011-2792: Use-after-free with float removal. Credit to miaubiz. [$1000] (High)
  • [87227] CVE-2011-2793: Use-after-free in media selectors. Credit to miaubiz. [$1000] (High)
  • [87298] CVE-2011-2794: Out-of-bounds read in text iteration. Credit to miaubiz. [$500] (Medium)
  • [87339] CVE-2011-2795: Cross-frame function leak. Credit to Shih Wei-Long. [$500] (Medium)
  • [87548] CVE-2011-2796: Use-after-free in Skia. Credit to Google Chrome Security Team (Inferno) and Kostya Serebryany of the Chromium development community. (High)
  • [87729] CVE-2011-2797: Use-after-free in resource caching. Credit to miaubiz. [$1000] (High)
  • [87815] CVE-2011-2798: Prevent a couple of internal schemes from being web accessible. Credit to sirdarckcat of the Google Security Team. (Low)
  • [87925] CVE-2011-2799: Use-after-free in HTML range handling. Credit to miaubiz. [$1000] (High)
  • [88337] CVE-2011-2800: Leak of client-side redirect target. Credit to Juho Nurminen. [$500] (Medium)
  • [88591] CVE-2011-2802: v8 crash with const lookups. Credit to Christian Holler. [$1000] (High)
  • [88827] CVE-2011-2803: Out-of-bounds read in Skia paths. Credit to Google Chrome Security Team (Inferno). (Medium)
  • [88846] CVE-2011-2801: Use-after-free in frame loader. Credit to miaubiz. [$1000] (High)
  • [88889] CVE-2011-2818: Use-after-free in display box rendering. Credit to Martin Barbella. [$1000] (High)
  • [89142] CVE-2011-2804: PDF crash with nested functions. Credit to Aki Helin of OUSPG. [$500] (High)
  • [89520] CVE-2011-2805: Cross-origin script injection. Credit to Sergey Glazunov. [$1500] (High)
  • [90222] CVE-2011-2819: Cross-origin violation in base URI handling. Credit to Sergey Glazunov. [$1500] (High)

Source: Google Chrome Releases

No comments: