Google Chrome 15.0.874.102 has been updated to the Stable channel

Google Chrome Stable Update
Google Chrome 15.0.874.102 has been released to the Stable channel for Windows, Mac OS, Linux, and Chrome Frame. This vesion is the first stable release of the Google Chrome major version 15.0. This release contains a number of new features and updates, as well as the security fixes listed in What's new in Google Chrome 15.0.874.102 Stable section.

Overview
Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites, access your favorite pages instantly with lightning speed from any new tab. Desktop shortcuts allow you to launch your favorite Web apps straight from your desktop.

Download Google Chrome
To install Google Chrome 15.0.874.102 Stable please visit http://www.google.com/chrome website.

What's new in Google Chrome 15.0.874.102 Stable
Chrome 15.0.874.102 contains a number of new features and updates, including:
  • A brand new New Tab Page.
  • Javascript Fullscreen API is now enabled by default.
  • Chrome Web Store items can now be installed inline by their verified site.
  • Omnibox History is now an additional sync data type.

Security fixes and rewards:
  1. [$500] [86758] CVE-2011-2845: URL bar spoof in history handling. Credit to Jordi Chancel. (High)
  2. [88949] CVE-2011-3875: URL bar spoof with drag+drop of URLs. Credit to Jordi Chancel. (Medium)
  3. [90217] CVE-2011-3876: Avoid stripping whitespace at the end of download filenames. Credit to Marc Novak. (Low)
  4. [91218] CVE-2011-3877: XSS in appcache internals page. Credit to Google Chrome Security Team (Tom Sepez) plus independent discovery by Juho Nurminen. (Low)
  5. [94487] CVE-2011-3878: Race condition in worker process initialization. Credit to miaubiz. (Medium)
  6. [95374] CVE-2011-3879: Avoid redirect to chrome scheme URIs. Credit to Masato Kinugawa. (Low)
  7. [95992] CVE-2011-3880: Don’t permit as a HTTP header delimiter. Credit to Vladimir Vorontsov, ONsec company. (Low)
  8. [$12174] [96047] [96885] [98053] [99512] [99750] CVE-2011-3881: Cross-origin policy violations. Credit to Sergey Glazunov. (High)
  9. [96292] CVE-2011-3882: Use-after-free in media buffer handling. Credit to Google Chrome Security Team (Inferno). (High)
  10. [$1000] [96902] CVE-2011-3883: Use-after-free in counter handling. Credit to miaubiz. (High)
  11. [97148] CVE-2011-3884: Timing issues in DOM traversal. Credit to Brian Ryner of the Chromium development community .(High)
  12. [$6337] [97599] [98064] [98556] [99294] [99880] [100059] CVE-2011-3885: Stale style bugs leading to use-after-free. Credit to miaubiz. (High)
  13. [$2000] [98773] [99167] CVE-2011-3886: Out of bounds writes in v8. Credit to Christian Holler. (High)
  14. [$1500] [98407] CVE-2011-3887: Cookie theft with javascript URIs. Credit to Sergey Glazunov. (Medium)
  15. [$1000] [99138] CVE-2011-3888: Use-after-free with plug-in and editing. Credit to miaubiz. (High)
  16. [$2000] [99211] CVE-2011-3889: Heap overflow in Web Audio. Credit to miaubiz. (High)
  17. [99553] CVE-2011-3890: Use-after-free in video source handling. Credit to Ami Fischman of the Chromium development community. (High)
  18. [100332] CVE-2011-3891: Exposure of internal v8 functions. Credit to Steven Keuchel of the Chromium development community plus independent discovery by Daniel Divricean. (High)

Source: Google Chrome Releases

No comments: