(LiveHacking.Com) – Google has released a new version of its Chrome web browser with twenty security fixes and new functionality to try and protect users from malicious downloads. Chrome 17.0.963.46 fixes one Critical security bug, a race condition after crash of the utility process, eight “High” rated vulnerabilities with the remaining being marked as “Medium” or “Low”. Google paid out a total of $11,500 to researchers for their efforts in finding vulnerabilities.
Fixes included in this release include:
-  Low CVE-2011-3953: Avoid clipboard monitoring after paste event. Credit to Daniel Cheng of the Chromium development community.
-  Low CVE-2011-3954: Crash with excessive database usage. Credit to Collin Payne.
-  High CVE-2011-3955: Crash aborting an IndexDB transaction. Credit to David Grogan of the Chromium development community.
-  Low CVE-2011-3956: Incorrect handling of sandboxed origins inside extensions. Credit to Devdatta Akhawe, UC Berkeley.
- [$1000]  High CVE-2011-3957: Use-after-free in PDF garbage collection. Credit to Aki Helin of OUSPG.
- [$2000]  High CVE-2011-3958: Bad casts with column spans. Credit to miaubiz.
- [$1000]  High CVE-2011-3959: Buffer overflow in locale handling. Credit to Aki Helin of OUSPG.
- [$500]  Medium CVE-2011-3960: Out-of-bounds read in audio decoding. Credit to Aki Helin of OUSPG.
- [$1000]  Critical CVE-2011-3961: Race condition after crash of utility process. Credit to Shawn Goertzen.
- [$500]  Medium CVE-2011-3962: Out-of-bounds read in path clipping. Credit to Aki Helin of OUSPG.
-  Medium CVE-2011-3963: Out-of-bounds read in PDF fax image handling. Credit to Atte Kettunen of OUSPG.
-  Low CVE-2011-3964: URL bar confusion after drag + drop. Credit to Code Audit Labs of VulnHunt.com.
-  Low CVE-2011-3965: Crash in signature check. Credit to Sławomir Błażek.
- [$1000]  High CVE-2011-3966: Use-after-free in stylesheet error handling. Credit to Aki Helin of OUSPG.
-  Low CVE-2011-3967: Crash with unusual certificate. Credit to Ben Carrillo.
- [$1000]  High CVE-2011-3968: Use-after-free in CSS handling. Credit to Arthur Gerkis.
- [$1000]  High CVE-2011-3969: Use-after-free in SVG layout. Credit to Arthur Gerkis.
- [$500]  Medium CVE-2011-3970: Out-of-bounds read in libxslt. Credit to Aki Helin of OUSPG.
- [$1000]  High CVE-2011-3971: Use-after-free with mousemove events. Credit to Arthur Gerkis.
-  Medium CVE-2011-3972: Out-of-bounds read in shader translator. Credit to Google Chrome Security Team (Inferno).
Chrome 17 also enhances its use of Google’s Safe Browsing, a continuously-updated list of known phishing and malware websites, to include checking of executable downloads. Chrome checks executable downloads against a list of known good files and publishers. If a file isn’t from a known source, Chrome sends the URL and IP of the host and other meta data, such as the file’s hash and binary size, to Google. The file is automatically classified using machine learning analysis and the reputation and trustworthiness of files previously seen from the same publisher and website. Google then sends the results back to Chrome, which warns you if you’re at risk.
Chrome 17 also contains a number of new features including:
- New Extensions APIs
- Updated Omnibox Prerendering
Chrome 17.0.963.46 is available for Windows, Mac, Linux. More details on the update is available on the Chrome Blog. Full details about what changes are in this release are available in the SVN revision log.