Google's browser Chrome, version 23 was just released. We quickly installed it to our browser cloud. You can now cross-browser test your websites in this new browser.

Cross browser testing in Chrome 23

Try Chrome 23 in Browserling now!

What's new in Chrome 23?

  • Added Do Not Track (DNT) setting.
  • Hardware video acceleration is now 25% more power efficient.
  • Added manager for site permission control.
  • New icon for Chrome Web Store when opening new tab.
  • On Mac OSX PPAPI Flash Player (or Pepper-based Flash Player) has been replaced the NPAPI Flash Player.

What's new for developers in Chrome 23?

  • Added WebRTC - Real-time communication in the browser.
  • Multimedia: Media Source Extensions - Allows appending data to an <audio>/<video> element.
  • Multimedia: Track element - Add subtitles, captions, screen reader descriptions, chapters and other types of timed metadata to video and audio. Chrome currently supports the WebVTT format for track data.
  • Pointer Lock (Mouse Lock) - Gives access to raw mouse movement, locks the target of mouse events to a single element, eliminates limits of how far mouse movement can go in a single direction, and removes the cursor from view. Obvious use cases are for first person or real time strategy games.

What security bugs were fixed in Chrome 23?

  • CVE-2012-5115: Defend against wild writes in buggy graphics drivers. Credit to miaubiz.
  • CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP handling. Credit to Phil Turnbull.
  • CVE-2012-5120: Out-of-bounds array access in v8. Credit to Atte Kettunen of OUSPG.
  • CVE-2012-5116: Use-after-free in SVG filter handling. Credit to miaubiz.
  • CVE-2012-5118: Integer bounds check issue in GPU command buffers. Credit to miaubiz.
  • CVE-2012-5121: Use-after-free in video layout. Credit to Atte Kettunen of OUSPG.
  • CVE-2012-5117: Inappropriate load of SVG subresource in img context. Credit to Felix Grobert of the Google Security Team.
  • CVE-2012-5119: Race condition in Pepper buffer handling. Credit to Fermin Serna of the Google Security Team.
  • CVE-2012-5122: Bad cast in input handling. Credit to Google Chrome Security Team (Inferno).
  • CVE-2012-5123: Out-of-bounds reads in Skia. Credit to Google Chrome Security Team (Inferno).
  • CVE-2012-5124: Memory corruption in texture handling. Credit to Al Patrick of the Chromium development community.
  • CVE-2012-5125: Use-after-free in extension tab handling. Credit to Alexander Potapenko of the Chromium development community.
  • CVE-2012-5126: Use-after-free in plug-in placeholder handling. Credit to Google Chrome Security Team (Inferno).
  • CVE-2012-5128: Bad write in v8. Credit to Google Chrome Security Team (Cris Neckar).

Happy cross-browser testing in Chrome 23!