NEW UPDATE : Google Chrome 15.0.874.102 FINAL Stable Version [Offline Setup Installer] for Windows, Linux, Mac

NEW UPDATE : Google Chrome 15.0.874.102 FINAL Stable Version [Offline Setup Installer] for Windows, Linux, Mac

FREE DOWNLOAD Google Chrome 15.0.874.102 FINALStable Version (Offline Setup Installer) for Windows (22.80 MB)

FREE DOWNLOAD Google Chrome 15.0.874.102 FINAL Stable Version [Offline Setup Installer] for LINUX

FREE DOWNLOAD Google Chrome 15.0.874.102 FINAL Stable Version (Offline Setup Installer) for MAC (42.00 MB)



In the latest stable release of Chrome, Google introduced a revamped New Tab Page. The new layout of the New Tab Page looks clean and sleek. The page is now split into two sections, one for most visited web pages while another showcased your installed web apps.

You can switch between sections using the labels (Most visited and Apps) at the bottom of the page.  Meanwhile, the recently closed tabs can be accessed from a menu at the right-bottom of the page.

Here’s a quick video tour on the New Tab Page. Check it out.



Change Log


The Google Chrome team is happy to announce the arrival of Chrome 15.0.874.102 to the Stable Channel for Windows, Mac, Linux, and Chrome Frame.  Chrome 15 contains some really great improvements including a new New Tab page. You can read about it more on the Google Chome blog.
Security fixes and rewards:
Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix.

  • [$500] [86758] High CVE-2011-2845: URL bar spoof in history handling. Credit to Jordi Chancel.
  • [88949] Medium CVE-2011-3875: URL bar spoof with drag+drop of URLs. Credit to Jordi Chancel.
  • [90217] Low CVE-2011-3876: Avoid stripping whitespace at the end of download filenames. Credit to Marc Novak.
  • [91218] Low CVE-2011-3877: XSS in appcache internals page. Credit to Google Chrome Security Team (Tom Sepez) plus independent discovery by Juho Nurminen.
  • [94487] Medium CVE-2011-3878: Race condition in worker process initialization. Credit to miaubiz.
  • [95374] Low CVE-2011-3879: Avoid redirect to chrome scheme URIs. Credit to Masato Kinugawa.
  • [95992] Low CVE-2011-3880: Don’t permit as a HTTP header delimiter. Credit to Vladimir Vorontsov, ONsec company.
  • [$12174] [96047] [96885] [98053] [99512] [99750] High CVE-2011-3881: Cross-origin policy violations. Credit to Sergey Glazunov.
  • [96292] High CVE-2011-3882: Use-after-free in media buffer handling. Credit to Google Chrome Security Team (Inferno).
  • [$1000] [96902] High CVE-2011-3883: Use-after-free in counter handling. Credit to miaubiz.
  • [97148] High CVE-2011-3884: Timing issues in DOM traversal. Credit to Brian Ryner of the Chromium development community.
  • [$6337] [97599] [98064] [98556] [99294] [99880] [100059] High CVE-2011-3885: Stale style bugs leading to use-after-free. Credit to miaubiz.
  • [$2000] [98773] [99167] High CVE-2011-3886: Out of bounds writes in v8. Credit to Christian Holler.
  • [$1500] [98407] Medium CVE-2011-3887: Cookie theft with javascript URIs. Credit to Sergey Glazunov.
  • [$1000] [99138] High CVE-2011-3888: Use-after-free with plug-in and editing. Credit to miaubiz.
  • [$2000] [99211] High CVE-2011-3889: Heap overflow in Web Audio. Credit to miaubiz.
  • [99553] High CVE-2011-3890: Use-after-free in video source handling. Credit to Ami Fischman of the Chromium development community.
  • [100322] High CVE-2011-3891: Exposure of internal v8 functions. Credit to Steven Keuchel of the Chromium development community plus independent discovery by Daniel Divricean.
The bugs [94487], [96292], [96902], [97599], [98064], [98556], [99294], [100059], [99138] and [99211] were detected using AddressSanitizer.

Although Chrome is not directly affected by the attack, the NSS network library was updated to include a defense against so-called BEAST. This defense may expose bugs in Brocade hardware. Brocade is working on the issue. The lighttpd project fixed a compatibility issue at version 1.4.27 and newer.

In addition, we would like to thank Sławomir Błażek and Aki Helin of OUSPG for working with us in the development cycle and preventing bugs from ever reaching the stable channel. Various rewards were issued.


Format Lainnya : PDF | Google Docs | English Version
Diposting pada : Kamis, 27 Oktober 11 - 20:29 WIB
Dibaca sebanyak : 2974 Kali
Tidak ada komentar pada blog ini...
Anda harus Login terlebih dahulu untuk mengirim komentar
Facebook Feedback

My Social-Net Accounts, You can Follow.. mungkin suatu hari nanti kita berjodoh (‾⌣‾)♉
ADS & Sponsor
Posting Terbaru Lainnya
Last Visitors
Alexa Rank