Hooray! Google has a new release for us - Chrome 14. We rushed to install it on our cross-browser testing platform and we wanted you to be able to try it as soon as it becomes public.
Try it yourself right away!
What's new in Chrome 14?
The most notable features are as follows:
- Native Client (NaCl) enabled for apps in the Chrome Web Store.
- Web Audio API.
- Additional macOS Lion feature support.
- Sync Encryption for all data.
- Print preview on Mac.
- Validation of HTTPS sites.
- Experimental Web Request extension API.
- Experimental Content Settings extension API.
Web Audio API
This is one of the top two most-most notable under-the-hood features in Chrome 14. This is a draft HTML5 feature that allows us, developers to use what Google calls "fancy audio effects" in the pages.
Native Client, or NaCl (Looks familiar from the chemistry classes doesn't it?) allow native C or C++ code to run in a sandbox within the browser. As the browsers industry evolves, the demand to easily move desktop applications to the browser cloud increases. So now you see why this feature is useful and will become even more useful in the future.
Full screen mode (OS X 10.7)
This feature is more eligible to the users and less to the developers, but as a matter of facts, it is indeed a major change in Google's Chrome 14.
If you are still running Chrome 13, you will receive the Chrome 14 update automatically or you can download it manually from Google's web site. If you don't want to install anything yet still experience the atmosphere in older Chrome versions, or maybe different browsers on different Operating Systems, you can try it out on Browserling via this link - Chrome 14 Live.
Developer features and updates in Chrome 14
- Content Security Policy Level 1 - Allows you to create a whitelist of sources of trusted content, and instructs the browser to only execute or render resources from those sources.
- Quota Management API - This API can be used to check how much quota an app/origin is using.
- a[download] attribute - When used on an
<a>, this attribute signifies that the resource it points to should be downloaded by the browser rather than navigating to it.
Bug fixes in Chrome 14
- CVE-2011-2835: Race condition in the certificate cache.
- CVE-2011-2836: Infobar the Windows Media Player plug-in to avoid click-free access to the system Flash.
- CVE-2011-2837: Use PIC / pie compiler flags.
- CVE-2011-2838: Treat MIME type more authoritatively when loading plug-ins.
- CVE-2011-2830: Crash in v8 script object wrappers.
- CVE-2011-2840: Possible URL bar spoofs with unusual user interaction.
- CVE-2011-2841: Garbage collection error in PDF.
- CVE-2011-2842: Insecure lock file handling in the Mac installer.
- CVE-2011-2843: Out-of-bounds read with media buffers.
- CVE-2011-2844: Out-of-bounds read with mp3 files.
- CVE-2011-2846: Use-after-free in unload event handling.
- CVE-2011-2847: Use-after-free in document loader.
- CVE-2011-2848: URL bar spoof with forward button.
- CVE-2011-2849: Browser NULL pointer crash with WebSockets.
- CVE-2011-3234: Out-of-bounds read in box handling.
- CVE-2011-2850: Out-of-bounds read with Khmer characters.
- CVE-2011-2851: Out-of-bounds read in video handling.
- CVE-2011-2852: Off-by-one in v8.
- CVE-2011-2853: Use-after-free in plug-in handling.
- CVE-2011-2854: Use-after-free in ruby / table style handing.
- CVE-2011-2855: Stale node in stylesheet handling.
- CVE-2011-2856: Cross-origin bypass in v8.
- CVE-2011-2857: Use-after-free in focus controller.
- CVE-2011-2834: Double free in libxml XPath handling.
- CVE-2011-2859: Incorrect permissions assigned to non-gallery pages.
- CVE-2011-2860: Use-after-free in table style handling.
- CVE-2011-2861: Bad string read in PDF.
- CVE-2011-2862: Unintended access to v8 built-in objects.
- CVE-2011-2864: Out-of-bounds read with Tibetan characters.
- CVE-2011-2858: Out-of-bounds read with triangle arrays.
- CVE-2011-2874: Failure to pin a self-signed cert for a session.
- CVE-2011-2875: Type confusion in v8 object sealing.
Have fun cross-browser testing in Chrome 14!
Email this blog post to your friends or yourself!
Enter a URL to test, choose platform, browser and version, and you'll get a live interactive browser in 5 seconds!