TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Critical Google Chrome hole plugged in 24 hours

46 点作者 dbh937大约 13 年前

4 条评论

sedev大约 13 年前
"To date, most successful attacks against Chrome exploit Adobe Flash, which is protected by a significantly more porous sandbox."<p>I notice that pretty much every time I read articles about Pwn2Own and similar. It's high time that Flash was abandoned as a ubiquitous part of the web. It is to web development as Outlook Express was to desktop software in the 90s - sure it's everywhere, but it's not doing much good by being so.
评论 #3683003 未加载
semenko大约 13 年前
The Chrome Release blog says it's fixed: <a href="http://googlechromereleases.blogspot.com/2012/03/chrome-stable-channel-update.html" rel="nofollow">http://googlechromereleases.blogspot.com/2012/03/chrome-stab...</a><p>And that the SVN commit history is available: <a href="http://build.chromium.org/f/chromium/perf/dashboard/ui/changelog.html?url=/branches/963/src&#38;range=125577:124982&#38;mode=html" rel="nofollow">http://build.chromium.org/f/chromium/perf/dashboard/ui/chang...</a><p>But I don't see any commit that look even remotely related to this exploit. What's up?
评论 #3683095 未加载
评论 #3686730 未加载
评论 #3682915 未加载
kevs大约 13 年前
With a response time like that it seems like antivirus software is becoming increasingly irrelevant.
评论 #3683222 未加载
评论 #3683233 未加载
评论 #3682825 未加载
gcp大约 13 年前
That's only the Pwnium hack, though. The Pwn2Own vulnerability remains undisclosed and unfixed.<p>Which leads me to the question: why aren't companies like Google customers of companies like Vupen? Too many of them to make it cost-effective? Or does Vupen (for example) prefer if those holes are <i>not</i> fixed? You can sell a vulnerability many times, after all.
评论 #3683311 未加载