Google ships Chrome 17, touts more malware alerts and page preloads
Patches 20 vulnerabilities, pays $10,500 in bounties to four bug hunters
Computerworld - Google today patched 20 vulnerabilities in the desktop edition of Chrome and added new anti-malware download warnings to version 17.
The company called out a pair of new features in Chrome 17, including the expansion of anti-malware download warnings and prerendering of pages suggested by the address/search bar's auto-complete function.
Google last refreshed Chrome eight weeks ago, on Dec. 13. Google generates an update to its "stable" channel about every six to eight weeks, a slightly more flexible schedule than rival Mozilla's every-six-weeks pace.
One of the 20 vulnerabilities patched today was rated "critical," the most dire ranking in Google's threat system. Eight were marked "high," while five were labeled "medium" and six were tagged "low."
Google paid $10,500 in bounties to four researchers for reporting 11 bugs, and another $3,133 to one of the four who uncovered a serious flaw that was quashed by developers before Chrome 17 made it to today's release. The nine other vulnerabilities were uncovered by members of Google's own security team, which includes developers who contribute to the open-source Chromium project -- which feeds code to Chrome -- or those who, for one reason or other, were not bonus-eligible.
Per its usual practice, Google blocked access to its bug tracking database for all 20 vulnerabilities to prevent outsiders from obtaining details that could be used to build exploits. Google typically opens up the database weeks or even months later, after it's sure a majority of users have migrated to the new edition.
Google typically includes a handful of obvious changes in each Chrome upgrade, and it stayed with that practice today: The two features visible to users were an extension of Chrome's long-running anti-malware download warnings and faster displaying of some Web pages.
The new download warnings alert users when they try to retrieve executable Windows files -- including those with the ".exe" and ".msi" extensions -- that Google knows or suspects are malicious, or are hosted on a website that commonly distributes threats.
Such warnings have been part of Chrome since version 12, which launched in June 2011, but they've been expanded in Chrome 17.
If the file isn't a known quantity or isn't from a reputable publisher, information about the file is sent to Google, which runs it through an analyzer to rank its "reputation and trustworthiness [compared to] files previously seen from the same publisher and website," said the company last month.
Suspicious files -- ones that match the criteria of others known to come from the same source -- are tagged, and if there's a high probability that it's malicious, the user sees an alert.
- Architects lead the next generation of data-driven applications Read this whitepaper to find out how application architects can quickly and confidently deliver long-lasting applications that minimize cost, complexity, and risk while...
- HTTP Status Code Cheat Sheet Look at the Graph, Find the Code and Boom - You're Solving Problems. Identifying and understanding common HTTP status codes can go a...
- Simple Solution, Big Capability Meet growing employee and business demands by connecting up to 1,000 users with powerful collaboration capabilities with a single, integrated platform -- Cisco...
- The Business Value of Continuous Delivery Download this whitepaper to learn more about the business value of Continuous Delivery and see why it could be a game changer for...
- Cloud BI in Action: Recorded Webinar of Customer, Kony, Inc. See how Kony, Inc., a leading enterprise mobility company, is using TIBCO Jaspersoft for Amazon Web Services and Redshift to achieve embedded analytics...
- Cloud BI Overview: Jaspersoft for AWS Check out this overview of Jaspersoft for AWS, to easily and affordably build business intelligence solutions as well as embed visualizations and analytics... All Desktop Apps White Papers | Webcasts