3.0.195.24 has been promoted to the stable channel. There are no additional fixes or changes in this release.
Security Fixes:
CVE-2009-0689 dtoa() error parsing long floating point numbers
The v8 engine uses a common dtoa() implementation to parse strings into floating point numbers. We have applied a patch to fix a recent bug in this component.
Severity: High. An attacker might be able to run arbitrary code within the Google Chrome sandbox.
Credit: Original discovery by Maksymilian Arciemowicz of SecurityReason. The Google Chrome security team determined that Chrome was affected.
Mitigations:
A victim would need to visit a page under an attacker’s control.
Any code that an attacker might be able to run inside the renderer process would be inside the sandbox
The beta channel has been updated to 3.0.195.24.
This update contains the following:
A fix to two significant history related crashing bugs 16591 and 21377.
A fix where PAC scripts would fail to parse if they ended with a comment and no new line 22864.
Corrected an issue where tabs would flash,for a split second, if multiple tabs were opened at the same time 20831.
Fixed an issue which prevented proper logins to CNET 22181.
|