Skip to content
This repository has been archived by the owner on Dec 4, 2023. It is now read-only.

Commit

Permalink
39.0.2171.65
Browse files Browse the repository at this point in the history
  • Loading branch information
zcbenz committed Nov 18, 2014
1 parent 526e4c8 commit 0c7d11a
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 0 deletions.
1 change: 1 addition & 0 deletions changelog/39.0.2171.65.html
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
The Chrome team is delighted to announce the promotion of Chrome 39 to the stable channel for Windows, Mac and Linux. Chrome 39.0.2171.65 contains a number of fixes and improvements, including:<br /><ul><li>64-bit support for Mac</li><li>A number of new apps/extension APIs&nbsp;</li><li>Lots of under the hood changes for stability and performance&nbsp;</li></ul>A partial list of changes is available in the <a href="https://chromium.googlesource.com/chromium/src/+log/38.0.2125.0..39.0.2171.0?pretty=fuller&amp;n=10000">log</a>.<br /><br /><b>Security Fixes and Rewards</b><br /><br /><i>Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.</i><br /><br />This update includes <a href="https://code.google.com/p/chromium/issues/list?can=1&amp;q=type%3Abug-security+label%3ARelease-0-M39&amp;sort=id+-security_severity+-secseverity+-owner+-modified&amp;colspec=ID+Pri+Status+Summary+Modified+OS+M+Security_severity+Security_impact+Owner+Reporter&amp;cells=tiles">42 security fixes</a>. Below, we highlight fixes that were either contributed by external researchers or particularly interesting. Please see the <a href="http://sites.google.com/a/chromium.org/dev/Home/chromium-security">Chromium security page</a> for more information.<br /><br />[$500][<a href="https://code.google.com/p/chromium/issues/detail?id=389734">389734</a>] <b>High</b> CVE-2014-7899: Address bar spoofing. <i>Credit to <a href="http://eligrey.com/">Eli Grey</a>.</i><br />[$1500][<a href="https://code.google.com/p/chromium/issues/detail?id=406868">406868</a>] <b>High</b> CVE-2014-7900: Use-after-free in pdfium. <i>Credit to Atte Kettunen from OUSPG.</i><br />[$1000][<a href="https://code.google.com/p/chromium/issues/detail?id=413375">413375</a>] <b>High</b> CVE-2014-7901: Integer overflow in pdfium. <i>Credit to cloudfuzzer.</i><br />[$1000][<a href="https://code.google.com/p/chromium/issues/detail?id=414504">414504</a>] <b>High</b> CVE-2014-7902: Use-after-free in pdfium. <i>Credit to cloudfuzzer.</i><br />[$3000][<a href="https://code.google.com/p/chromium/issues/detail?id=414525">414525</a>] <b>High</b> CVE-2014-7903: Buffer overflow in pdfium. <i>Credit to cloudfuzzer.</i><br />[$2000][<a href="https://code.google.com/p/chromium/issues/detail?id=418161">418161</a>] <b>High</b> CVE-2014-7904: Buffer overflow in Skia. <i>Credit to Atte Kettunen from OUSPG.</i><br />[$2000][<a href="https://code.google.com/p/chromium/issues/detail?id=421817">421817</a>] <b>High</b> CVE-2014-7905: Flaw allowing navigation to intents that do not have the BROWSABLE category. <i>Credit to WangTao(neobyte) of Baidu X-Team.</i><br />[$500][<a href="https://code.google.com/p/chromium/issues/detail?id=423030">423030</a>] <b>High</b> CVE-2014-7906: Use-after-free in pepper plugins. <i>Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.</i><br />[$7500][<a href="https://code.google.com/p/chromium/issues/detail?id=423703">423703</a>] <b>High</b> CVE-2014-0574: Double-free in Flash. <i>Credit to</i> <i>biloulehibou.</i><br />[$5000][<a href="https://code.google.com/p/chromium/issues/detail?id=424453">424453</a>] <b>High</b> CVE-2014-7907: Use-after-free in blink. <i>Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.</i><br />[$500][<a href="https://code.google.com/p/chromium/issues/detail?id=425980">425980</a>] <b>High</b> CVE-2014-7908: Integer overflow in media. <i>Credit to Christoph Diehl.</i><br />[$500][<a href="https://code.google.com/p/chromium/issues/detail?id=391001">391001</a>] <b>Medium</b> CVE-2014-7909: Uninitialized memory read in&nbsp;Skia. <i>Credit to miaubiz.</i><br /><br />We would also like to thank <i>Atte Kettunen, Christian Holler, cloudfuzzer, </i>and<i> mmaliszkiewicz</i> for working with us during the development cycle to prevent security bugs from ever reaching the stable channel. $16500 in additional rewards were issued.<br /><br />As usual, our ongoing internal security work was responsible for a wide range of fixes:<br />[<a href="https://code.google.com/p/chromium/issues/detail?id=433500">433500</a>] CVE-2014-7910: Various fixes from internal audits, fuzzing and other initiatives.<br /><br />Many of the above bugs were detected using&nbsp;<a href="http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer">AddressSanitizer</a>&nbsp;or <a href="https://code.google.com/p/memory-sanitizer/wiki/MemorySanitizer">MemorySanitizer</a>.<br /><br />Interested in switching release channels? <a href="http://www.chromium.org/getting-involved/dev-channel">Find out how</a>. If you find a new issue, please let us know by <a href="http://crbug.com/">filing a bug</a>.<br /><br />Alex Mineer<br />Google Chrome<img src="http://feeds.feedburner.com/~r/GoogleChromeReleases/~4/Dh1Ne0M_TFw" height="1" width="1"/>
1 change: 1 addition & 0 deletions changelog/39.0.2171.65.title
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
Stable Channel Update

0 comments on commit 0c7d11a

Please sign in to comment.