Skip to main content

Latest Windows 10 preview cripples 64-bit Chrome

Latest Windows 10 preview cripples 64-bit Chrome

Google
Google Chrome browser logos Credit: Gerd Altmann / Pixabay

Tuesday's build 10525 stymies Chrome; Google has logged the bug into the Chromium tracker

Microsoft's latest Insider build of Windows 10 has crippled the 64-bit version of Google's Chrome browser.
After Microsoft issued build 10525 Tuesday, Chrome users began reporting on Google's help forum, on Reddit and elsewhere, that their browsers were consistently crashing.
battle war fight
A U.S. regulation requiring companies to disclose whether they get minerals from war zones is turning
READ NOW
"I'm on Windows Insider Preview and just upgraded toWindows 10 Pro Build 10525 which was just released to Insider Preview members and Google Chrome doesn't work in this build," wrote someone identified as ksweeleyon a thread in the Chrome support forum. "All versions (stable, beta, developer and Canary) do not work, I get the 'Aw Snap!' page ... and no pages will load."
A much longer thread on Reddit also tackled the problem. "I tried reinstalling Chrome, I even tried installing a different branch (the beta one), but I just cannot get it to work," added James1o1o.
According to the reports, and confirmed byComputerworld, the 64-bit version of Chrome, which made it to the Stable channel a year ago, does not run on Windows 10 build 10525. The 32-bit browser, however, works fine.
An entry in the Chromium bug tracker -- Chromium is the open-source project that feeds code into Chrome -- was logged yesterday.
"Cutting through the noise, it looks like the sandbox is breaking in the Win10 10525 previews for 64-bit Chrome," acknowledged Justin Schuh, a Google software engineer, in one message on the bug tracker. "If Firefox e10s is also breaking as well, then it must be something pretty basic, like our hooks breaking under CFG."
Chrome relies on an anti-exploitation technology, colloquially called a "sandbox," to isolate the browser's processes as part of an effort to stop or at least impede attackers leveraging a vulnerability, hopefully blocking them from planting malware on a device. Schuh's reference to "e10s" was to Mozilla's work on a sandboxing technology for its Firefox browser.
Schuh also linked to an associated entry in the bug tracker, which referred to requests by both Microsoft andIntel to Google to change Chrome "to work better with their ongoing ROP mitigation efforts."
ROP, for "return-oriented programming," is an exploit technique that has been a past focus of Microsoft's defensive efforts. ROP has a rich history: The Stuxnet worm, reportedly created by U.S. and Israeli coders to sabotage Iran's nuclear fuel enrichment facilities, made extensive use of ROP.
According to users on Reddit, the 64-bit version can be forced to run by appending "--no-sandbox" (without the quotation marks) to the Windows shortcut for Chrome. That, of course, also disables one of Chrome's most important defenses. Alternately, users can switch to 32-bit Chrome, or another browser.
Several on Reddit wondered whether the changes in build 10525 to Windows 10's memory management were behind the Chrome snafu. According to Microsoft, the build instigated a cache of compressed "pages," or contiguous memory blocks, that were stored in virtual memory rather than written to the device's physical memory or disk drive. The changes free up physical memory -- the actual RAM available on a device -- so that more apps can be maintained in the former for quick resuscitation and improves the OS's responsiveness.
Because the default download on Windows is for the 32-bit version, not everyone running Google's browser on Windows 10 build 10525 has been affected.
Chrome 64 bit dies
Chrome 64-bit on Windows 10 build 10525 won't run, and instead displays this 'He's dead, Jim!' message. One workaround is to install 32-bit Chrome instead.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…