Google Chrome 20.0.1132.43 Final Offline InstallerUpdated by Andra Blackbone | Thursday, June 28, 2012
Google Chrome is Google's web browser. With it you can launch applications and web games in a nice, easy and, above all, fast. It is the main alternative to Firefox and Internet Explorer.
Google Chrome is a very easy to use. Its only bar, Omnibox, to enter web addresses and search Google. Words as you type, Google Chrome suggests outcomes of history, the favorite page or web applications installed.
This release fixes a number of issues including:
-  Low CVE-2012-2815: Leak of iframe fragment id. Credit to Elie Bursztein of Google.
- [Windows only]   High CVE-2012-2816: Prevent sandboxed processes interfering with each other. Credit to Google Chrome Security Team (Justin Schuh).
- [$1000]  High CVE-2012-2817: Use-after-free in table section handling. Credit to miaubiz.
- [$1000]  High CVE-2012-2818: Use-after-free in counter layout. Credit to miaubiz.
-  High CVE-2012-2819: Crash in texture handling. Credit to Ken “gets” Russell of the Chromium development community.
-  Medium CVE-2012-2820: Out-of-bounds read in SVG filter handling. Credit to Atte Kettunen of OUSPG.
-  Medium CVE-2012-2821: Autofill display problem. Credit to “simonbrown60”.
- [various] Medium CVE-2012-2822: Misc. lower severity OOB read issues in PDF. Credit to awesome ASAN and various Googlers (Kostya Serebryany, Evgeniy Stepanov, Mateusz Jurczyk, Gynvael Coldwind).
- [$1000]  High CVE-2012-2823: Use-after-free in SVG resource handling. Credit to miaubiz.
- [$1000]  High CVE-2012-2824: Use-after-free in SVG painting. Credit to miaubiz.
-  Medium CVE-2012-2826: Out-of-bounds read in texture conversion. Credit to Google Chrome Security Team (Inferno).
- [Mac only]  Low CVE-2012-2827: Use-after-free in Mac UI. Credit to the Chromium development community (Dharani Govindan).
-  High CVE-2012-2828: Integer overflows in PDF. Credit to Mateusz Jurczyk of Google Security Team and Google Chrome Security Team (Chris Evans).
- [$1000]  High CVE-2012-2829: Use-after-free in first-letter handling. Credit to miaubiz.
- [$1000]  High CVE-2012-2830: Wild pointer in array value setting. Credit to miaubiz.
- [Windows only]  Low CVE-2012-2764: Unqualified load of metro DLL. Credit to Moshe Zioni of Comsec Consulting.
- [$1000]  High CVE-2012-2831: Use-after-free in SVG reference handling. Credit to miaubiz.
-  High CVE-2012-2832: Uninitialized pointer in PDF image codec. Credit to Mateusz Jurczyk of Google Security Team.
-  High CVE-2012-2833: Buffer overflow in PDF JS API. Credit to Mateusz Jurczyk of Google Security Team.
- [$1000]  High CVE-2012-2834: Integer overflow in Matroska container. Credit to Jüri Aedla.