Google Chrome 22.0.1229.92 Stable released to address multiple vulnerabilities

Google Chrome Stable Update
Google has released Google Chrome 22.0.1229.92 for Windows, Linux, Mac OS and Chrome Frame to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition. This update also have a new version of Flash Player (version 11.4.31.110) with security and other fixes.

For gamers, Google Chrome 22 includes the Pointer Lock JavaScript API (a.k.a. mouse lock). This means 3D web apps and games like first-person shooters can remove your cursor from the screen and get access to raw mouse movement data, so you can pan the screen’s view to your heart’s content. You can play with this nifty WebGL Quake 3 map viewer to see it in action.

Install Google Chrome Stable
To install Google Chrome 22.0.1229.92 Stable please visit http://www.google.com/chrome web site.

Google Chrome 22.0.1229.92 Stable

Note: If you’re running the Windows 8 Enterprise trial version, you’ll be able to try Chrome in Windows 8 Style UI mode by setting it as your default browser.

Google Chrome 22.0.1229.92 Stable (Windows 8 Modern UI)

What's new in Google Chrome 22.0.1229.92 Stable (October 8, 2012)
This release contains the following updates:
  • A new version of Adobe Flash Player. (11.4.31.110)

Security fixes:
  • [$1000] [138208] CVE-2012-2900: Crash in Skia text rendering. Credit to Atte Kettunen of OUSPG. (High)
  • [$3133.7] [147499] CVE-2012-5108: Race condition in audio device handling. Credit to Atte Kettunen of OUSPG. (Critical)
  • [$500] [148692] CVE-2012-5109: OOB read in ICU regex. Credit to Arthur Gerkis. (Medium)
  • [151449] CVE-2012-5110: Out-of-bounds read in compositor. Credit to Google Chrome Security Team (Inferno). (Medium)
  • [151895] CVE-2012-5111: Plug-in crash monitoring was missing for Pepper plug-ins. Credit to Google Chrome Security Team (Chris Evans). (Low)

Note: Many of the above bugs were detected using AddressSanitizer.

Source:

No comments: