快三彩票app

Google谷歌瀏覽器最新版Chrome v80.0.3987.87 正式版發布

CINDY 0人評論 7775次瀏覽 谷歌瀏覽器
摘要 : Google谷歌瀏覽器最新版Chrome v80.0.3987.87 正式版發布
谷歌瀏覽器Google Chrome穩定版迎來v80首個版本發布,詳細版本號為v80.0.3987.87,上一個正式版v79.0.3945.130發布于1月17日,時隔19天Google又發布了新版Chrome瀏覽器,本次升級主要是更新了安全修復和穩定性改進及用戶體驗。

快三彩票app 谷歌瀏覽器v80正式版主要更新,引入SameSite Cookie可能會破壞網站功能,啟用這項功能之后意味著只有從安全鏈接訪問cookies的時候,它們才可以在第三方上下文中使用。

Google谷歌瀏覽器最新版Chrome v80.0.3987.87 正式版發布

 谷歌瀏覽器Chrome近期版本回顧

谷歌瀏覽器v79正式版主要更新,對密碼檢查工具的內置支持,通過安全瀏覽API實時將惡意網站列入黑名單,可預防網絡釣魚的常規可用性,禁止加載HTTPS“混合內容”,支持選項卡凍結,Chrome Sync個人資料部分的新界面,以及對后退緩存機制的支持。

谷歌瀏覽器v78正式版快三彩票app主要更新,帶來了多項功能和改進,在Windows 10(版本 1511+)系統上默認啟用。還引入了內置的密碼檢查工具,目的是如果在用戶登錄期間發現異常就會發出提醒,允許用戶在新標簽頁中添加壁紙,以及安裝來自于Chrome Web Store上的主題。

Chrome 80 值得關注的主要更新如下:

1、引入全新的 cookie 分類模型 SameSite

在 Chrome 80 中,Chrome 會將沒有聲明 SameSite 值的 cookie 默認設置為SameSite=Lax。只有采用SameSite=None; Secure設置的 cookie 可以從外部訪問,前提是通過安全連接(即 HTTPS)訪問。
這個處理 cookie 文件方式的變化就是本次更新的第一項重大更改,它將改變以往用戶隱私被濫用的現象,保證僅能通過 HTTPS 連接訪問跨站 cookie。除了直接的安全優勢外,明確聲明跨站 cookie 還能提高透明度和用戶選擇。例如,瀏覽器可以為用戶提供管理 cookie 時的精細控制,將僅可以在單個網站訪問的 cookie 與可以在多個網站訪問的 cookie 分開。其實早在 Chrome 51 中就已首次引入 SamSite Cookie,其設計為用來阻止偽造的跨站點 Cookie 請求。

2、靜默通知

Chrome 80 引入更安靜的消息通知機制就是本次更新的第二項重大更改。簡單描述此機制就是,網頁請求發送通知權限時,橫幅或者彈窗通知會以更安靜、更低調的方式呈現,而不再像原來那樣在網頁中間或頂部/底部占用空間。“更安靜的通知”在 PC 設備和移動設備上均可用。不過有趣的是,Chrome 在首次向用戶展示該功能時,會在產品內顯示一個幫助對話框(這已經不安靜了)。

3、將所有混合音頻和視頻資源自動升級為 HTTPS

根據 Google 的說法,Chrome 用戶現在在所有主要平臺上的 HTTPS 上花費了 90% 以上的瀏覽時間。但是,那些安全頁面加載不安全的 HTTP 子資源卻是很常見的。這些子資源中的許多默認情況下都是被阻止的,但有些會作為圖像、音頻和視頻或“混合內容”潛入,混合內容可能會使用戶面臨風險,比如腳本、iframe 與媒體文件。因此從 Chrome 79 開始,Chrome 已開始逐步阻止所有混合內容,并添加了一個新設置項,用戶可以用來取消阻止特定站點上的混合內容。到了最新發布的 Chrome 80,它將所有混合音頻和視頻資源自動升級為 HTTPS,如果無法通過 HTTPS 加載,瀏覽器雖然允許加載混合圖像,但會將頁面標記為“Not Secure”。
最終在 Chrome 81 中會將所有混合圖像、音頻與視頻自動升級為 HTTPS,并且阻止那些無法通過 HTTPS 加載的圖像。

4、移除對 FTP 的支持

從 Chrome 80 開始不再支持 FTP,默認情況下,它對非企業客戶端禁用了 FTP 支持。按照計劃,到了 Chrome 82 將會刪除 FTP 相關代碼和資源
  • 移除對 FTP 的支持
  • 標簽分組,每組可配置個性化顏色
  • 支持 SVG 格式的圖像,進一步降低站點資源占用
  • 上線聯系人選取和內容索引 API

5、聯系人選取和內容索引 API

聯系人選取和內容索引 API


谷歌瀏覽器Chrome官方更新日志

Chrome穩定版已經更新到v80.0.3987.87安全修復程序和獎勵更新包括56項安全修復
[$5000][1034394] High CVE-2020-6381: Integer overflow in JavaScript. Reported by The UK's National Cyber Security Centre (NCSC) on 2019-12-09
[$2000][1031909] High CVE-2020-6382: Type Confusion in JavaScript. Reported by Soyeon Park and Wen Xu from SSLab, Gatech on 2019-12-08
[$500][1020745] High CVE-2019-18197: Multiple vulnerabilities in XML. Reported by BlackBerry Security Incident Response Team on 2019-11-01
[$500][1042700] High CVE-2019-19926: Inappropriate implementation in SQLite. Reported by Richard Lorenz, SAP on 2020-01-16
[$N/A][1035399] High CVE-2020-6385: Insufficient policy enforcement in storage. Reported by Sergei Glazunov of Google Project Zero on 2019-12-1
[$N/A][1038863] High CVE-2019-19880, CVE-2019-19925: Multiple vulnerabilities in SQLite. Reported by Richard Lorenz, SAP on 2020-01-03
[$N/A][1042535] High CVE-2020-6387: Out of bounds write in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2020-01-16
[$N/A][1042879] High CVE-2020-6388: Out of bounds memory access in WebAudio. Reported by Sergei Glazunov of Google Project Zero on 2020-01-16
[$N/A][1042933] High CVE-2020-6389: Out of bounds write in WebRTC. Reported by Natalie Silvanovich of Google Project Zero on 2020-01-16
[$N/A][1045874] High CVE-2020-6390: Out of bounds memory access in streams. Reported by Sergei Glazunov of Google Project Zero on 2020-01-27
[$10000][1017871] Medium CVE-2020-6391: Insufficient validation of untrusted input in Blink. Reported by Micha? Bentkowski of Securitum on 2019-10-24
[$5000][1030411] Medium CVE-2020-6392: Insufficient policy enforcement in extensions. Reported by Microsoft Edge Team on 2019-12-03
[$5000][1035058] Medium CVE-2020-6393: Insufficient policy enforcement in Blink. Reported by Mark Amery on 2019-12-17
[$3000][1014371] Medium CVE-2020-6394: Insufficient policy enforcement in Blink. Reported by Phil Freo on 2019-10-15
[$3000][1022855] Medium CVE-2020-6395: Out of bounds read in JavaScript. Reported by Pierre Langlois from Arm on 2019-11-08
[$3000][1035271] Medium CVE-2020-6396: Inappropriate implementation in Skia. Reported by William Luc Ritchie on 2019-12-18
[$2000][1027408] Medium CVE-2020-6397: Incorrect security UI in sharing. Reported by Khalil Zhani on 2019-11-22
[$2000][1032090] Medium CVE-2020-6398: Uninitialized use in PDFium. Reported by pdknsk on 2019-12-09
[$2000][1039869] Medium CVE-2020-6399: Insufficient policy enforcement in AppCache. Reported by Luan Herrera (@lbherrera_) on 2020-01-07
[$1000][1038036] Medium CVE-2020-6400: Inappropriate implementation in CORS. Reported by Takashi Yoneuchi (@y0n3uchy) on 2019-12-27
[$500][1017707] Medium CVE-2020-6401: Insufficient validation of untrusted input in Omnibox. Reported by Tzachy Horesh on 2019-10-24
[$500][1029375] Medium CVE-2020-6402: Insufficient policy enforcement in downloads. Reported by Vladimir Metnew (@vladimir_metnew) on 2019-11-28
[$TBD][1006012] Medium CVE-2020-6403: Incorrect security UI in Omnibox. Reported by Khalil Zhani on 2019-09-19
[$N/A][1024256] Medium CVE-2020-6404: Inappropriate implementation in Blink. Reported by kanchi on 2019-11-13
[$N/A][1042145] Medium CVE-2020-6405: Out of bounds read in SQLite. Reported by Yongheng Chen(Ne0) & Rui Zhong(zr33) on 2020-01-15
[$N/A][1042254] Medium CVE-2020-6406: Use after free in audio. Reported by Sergei Glazunov of Google Project Zero on 2020-01-15
[$N/A][1042578] Medium CVE-2019-19923: Out of bounds memory access in SQLite. Reported by Richard Lorenz, SAP on 2020-01-16
[$1000][1026546] Low CVE-2020-6408: Insufficient policy enforcement in CORS. Reported by Zhong Zhaochen of andsecurity.cn on 2019-11-20
[$1000][1037889] Low CVE-2020-6409: Inappropriate implementation in Omnibox. Reported by Divagar S and Bharathi V from Karya Technologies on 2019-12-26
[$500][881675] Low CVE-2020-6410: Insufficient policy enforcement in navigation. Reported by evi1m0 of Bilibili Security Team on 2018-09-07
[$500][929711] Low CVE-2020-6411: Insufficient validation of untrusted input in Omnibox. Reported by Khalil Zhani on 2019-02-07
[$N/A][968505] Low CVE-2020-6412: Insufficient validation of untrusted input in Omnibox. Reported by Zihan Zheng (@zzh1996) of University of Science and Technology of China on 2019-05-30
[$N/A][1005713] Low CVE-2020-6413: Inappropriate implementation in Blink. Reported by Micha? Bentkowski of Securitum on 2019-09-19
[$N/A][1021855] Low CVE-2020-6414: Insufficient policy enforcement in Safe Browsing. Reported by Lijo A.T on 2019-11-06
[$N/A][1029576] Low CVE-2020-6415: Inappropriate implementation in JavaScript. Reported by Avihay Cohen @ SeraphicAlgorithms on 2019-11-30
[$N/A][1031895] Low CVE-2020-6416: Insufficient data validation in streams. Reported by Woojin Oh(@pwn_expoit) of STEALIEN on 2019-12-08
[$N/A][1033824] Low CVE-2020-6417: Inappropriate implementation in installer. Reported by Renato "Wrath" Moraes and Altieres "FallenHawk" Rohr on 2019-12-13
[1048330] Various fixes from internal audits, fuzzing and other initiatives

Google Chromev80.0.3987.87穩定版離線安裝包官方本地下載地址:

Google Chrome v80.0.3987.87 無更新功能版 64位

SHA1:CAE546BDDEC2F68D0C4C03C57122F7942B9E7989
SHA256:C8C58C5618729A415DED01C4D0B26A1DE1AE8C5DD1DB1A4CA668EB56916DF8C1
http://dl.google.com/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://dl.google.com/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://www.google.com/dl/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://www.google.com/dl/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://redirector.gvt1.com/edgedl/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://redirector.gvt1.com/edgedl/release2/chrome/APwT_PugZs0Rf9lGhVkF3QA_80.0.3987.87/80.0.3987.87_chrome_installer.exe

Google Chrome v80.0.3987.87 無更新功能版 32位

SHA1:A01FF2313B50E1C303EE43758BEF77B896794884
SHA256:5B0C80C632322CDB5FAA41152BC9F0889DAA5DADB8E19C1860C1F8A3C1889C0C
http://dl.google.com/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://dl.google.com/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://www.google.com/dl/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://www.google.com/dl/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://redirector.gvt1.com/edgedl/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe
http://redirector.gvt1.com/edgedl/release2/chrome/AIrLSlgCL8Mvuuhy9gpuOek_80.0.3987.87/80.0.3987.87_chrome_installer.exe

Google Chrome v80.0.3987.87 Mac版

SHA1:C34561F67FF26353D362DF3EBEA69965FB33FEE4
SHA256:F4E5655D8C026EB0B0796F988C4026DAE6C7E16CB310E2E172DB195A9A93B44A
http://dl.google.com/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg
http://dl.google.com/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg
http://www.google.com/dl/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg
http://www.google.com/dl/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg
http://redirector.gvt1.com/edgedl/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg
http://redirector.gvt1.com/edgedl/release2/chrome/AJkrrB9igve6Mz4STD5utjA_80.0.3987.87/GoogleChrome-80.0.3987.87.dmg

Google Chrome 官方帶更新功能版 網盤:

http://www.lanzous.com/b138066

轉載必須注明來自: Chrome插件 ? Google谷歌瀏覽器最新版Chrome v80.0.3987.87 正式版發布

Google谷歌浏览器最新版Chrome v80.0.3987.87 正式版发布 - Chrome插件(谷歌浏览器插件)

快三彩票app

評論:(0)

已有 0 位網友發表了一針見血的評論,你還等什么?

?