智能化下的产物,无人棋牌室
Google Chrome 稳定版 56.0.2924.76 正式发布了,该版本包含大量修复和改进。
此版本包含 51 个安全修复,以下是一些值得关注的安全修复:
- [$8837][671102] High CVE-2017-5007: Universal XSS in Blink. Credit to Mariusz Mlynski
- [$8000][673170] High CVE-2017-5006: Universal XSS in Blink. Credit to Mariusz Mlynski
- [$8000][668552] High CVE-2017-5008: Universal XSS in Blink. Credit to Mariusz Mlynski
- [$7500][663476] High CVE-2017-5010: Universal XSS in Blink. Credit to Mariusz Mlynski
- [$3000][662859] High CVE-2017-5011: Unauthorised file access in Devtools. Credit to Khalil Zhani
- [$3000][667504] High CVE-2017-5009: Out of bounds memory access in WebRTC. Credit to Sean Stanek and Chip Bradford
- [$5500][681843] High CVE-2017-5012: Heap overflow in V8. Credit to Gergely Nagy (Tresorit)
- [$2000][677716] Medium CVE-2017-5013: Address spoofing in Omnibox. Credit to Haosheng Wang (@gnehsoah)
- [$2000][675332] Medium CVE-2017-5014: Heap overflow in Skia. Credit to sweetchip
- [$2000][673971] Medium CVE-2017-5015: Address spoofing in Omnibox. Credit to Armin Razmdjou
- [$2000][666714] Medium CVE-2017-5019: Use after free in Renderer. Credit to Wadih Matar
- [$1000][673163] Medium CVE-2017-5016: UI spoofing in Blink. Credit to Haosheng Wang (@gnehsoah)
- [$500][676975] Medium CVE-2017-5017: Uninitialised memory access in webm video. Credit to danberm
- [$500][668665] Medium CVE-2017-5018: Universal XSS in chrome://apps. Credit to Rob Wu
- [$TBD][668653] Medium CVE-2017-5020: Universal XSS in chrome://downloads. Credit to Rob Wu
- [$N/A][663726] Low CVE-2017-5021: Use after free in Extensions. Credit to Rob Wu
- [$N/A][663620] Low CVE-2017-5022: Bypass of Content Security Policy in Blink. Credit to 李普君 of 无声信息技术PKAV Team
- [$N/A][651443] Low CVE-2017-5023: Type confusion in metrics. Credit to the UK’s National Cyber Security Centre (NCSC)
- [$N/A][643951] Low CVE-2017-5024: Heap overflow in FFmpeg. Credit to Paul Mehta
- [$N/A][643950] Low CVE-2017-5025: Heap overflow in FFmpeg. Credit to Paul Mehta
- [$500][634108] Low CVE-2017-5026: UI spoofing. Credit to Ronni Skansing
As usual, our ongoing internal security work was responsible for a wide range of fixes:
- [685349] Various fixes from internal audits, fuzzing and other initiatives
许多安全漏洞都是使用 AddressSanitizer, MemorySanitizer, Control Flow Integrity, 或 libFuzzer 来检测的。