The Chrome development team has announced its release Chrome 39 on the fixed channel for Windows, Mac, and Linux. The new version of Chrome 39.0.2171.65 comes with a long list of fixes and improvements, including:
64-bit support for Mac
A number of new apps and API extensions
Many changes for more stability and better performance
Some of the changes are described in change log.
You can download the new version from here, or directly from Chrome which useste by going to the address
chrome: // chrome /
Security Corrections and Rewards
Note: Bug details will not be announced until the majority of users update their program to the new version. Still, the company says the update includes 42 security fixes. Below, they list the fixes to the code following suggestions made to them by external researchers or by its own security team Google. For more information you can see on its official website Chromium.
[500] [389734] High CVE-2014-7899: Address bar spoofing. Credit to Eli Gray.[1500] [406868] High CVE-2014-7900: Use-after-free in pdf. Credit to Atte Kettunen from OUSPG.
[1000] [413375] High CVE-2014-7901: Integer overflow in pdf. Credit to cloudfuzzer.
[1000] [414504] High CVE-2014-7902: Use-after-free in pdf. Credit to cloudfuzzer.
[3000] [414525] High CVE-2014-7903: Buffer overflow in pdf. Credit to cloudfuzzer.
[2000] [418161] High CVE-2014-7904: Buffer overflow in Skia. Credit to Atte Kettunen from OUSPG.
[2000] [421817] High CVE-2014-7905: Flaw allowing navigation to intents that do not have the BROWSABLE category. Credit to WangTao (unhappy) of Baidu X-Team.
[$ 500] [423030] High CVE-2014-7906: Use-after-free in pepper plugins. Credit to Chen Zhang (demi6od) of the NSFOCUS Security Team.
[$7500][423703] High CVE-2014-0574: Double- free in Flash. Credit to biloulehibou.
[5000] [424453] High CVE-2014-7907: Use-after-free in blink. Credit to Chen Zhang (demi6) of the NSFOCUS Security Team.
[500] [425980] High CVE-2014-7908: Integer overflow in media. Credit to Christoph Diehl.
[500] [391001] Medium CVE-2014-7909: Uninitialized memory read in Skia. Credit to miaubiz.