Notizia Precedente
Firefox 15 Beta 3

Google Chrome 21.0.1180.57, nuove API getUserMedia anche nel canale stabile

Naviga SWZ: Home Page » News
News del 01 Agosto 12 Autore: Gianplugged
Google Chrome 21.0.1180.57, nuove API getUserMedia anche nel canale stabile

Google rilascia la versione 21.0.1180.57 di Google Chrome, che porta anche nel canale stabile le nuove API le quali permettono agli sviluppatori di realizzare applicazioni in grado di utilizzare microfono, videocamera del computer e i game controller senza la necessità di alcun plugin.

Gli sviluppatori possono così proporre una più grande varietà di applicazioni web per le conversazioni audio/video, creazione di musica e altre operazioni che abbiano alla base l´utiiizzo di videocamera e/o microfono. Le nuove API possono essere utilizzate anche insieme ad altre tecnologie web per realizzare effetti, come l´applicazione di filtri in tempo reale, la rotazione del video ecc.

La prima API è denominata getUserMedia e utilizza il protocollo WebRTC, in grado di utilizzare un nuovo sistema di comunicazione in tempo reale basato su HTML5 e Javascript. La seconda API è denominata invece GamepadJavascript e consente al browser di riconoscere i game controller.

Ulteriori informazioni sul Blog di Chrome a questo indirizzo:

http://chrome.blogspot.fr/2012/07/new-senses-for-web.html

Note di rilascio:

The Chrome team is excited to announce the release of Chrome 21 to the Stable Channel. 21.0.1180.57 for Mac and Linux. 21.0.1180.60 for Windows and Chrome Frame. Chrome 21 contains a number of new features including a new API for high-quality video and audio communication. More detailed updates are available on the Chrome Blog.  

Security fixes and rewards:Please see the Chromium security page for more detail. Note that the referenced bugs may be kept private until a majority of our users are up to date with the fix 

[Linux only] [125225] Medium CVE-2012-2846: Cross-process interference in renderers. Credit to Google Chrome Security Team (Julien Tinnes).
[127522] Low CVE-2012-2847: Missing re-prompt to user upon excessive downloads. Credit to Matt Austin of Aspect Security.
[127525] Medium CVE-2012-2848: Overly broad file access granted after drag+drop. Credit to Matt Austin of Aspect Security.
[128163] Low CVE-2012-2849: Off-by-one read in GIF decoder. Credit to Atte Kettunen of OUSPG.
[130251] [130592] [130611] [131068] [131237] [131252] [131621] [131690] [132860] Medium CVE-2012-2850: Various lower severity issues in the PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[132585] [132694] [132861] High CVE-2012-2851: Integer overflows in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[134028] High CVE-2012-2852: Use-after-free with bad object linkage in PDF. Credit to Alexey Samsonov of Google
[134101] Medium CVE-2012-2853: webRequest can interfere with the Chrome Web Store. Credit to Trev of Adblock
[134519] Low CVE-2012-2854: Leak of pointer values to WebUI renderers. Credit to Nasko Oskov of the Chromium development community.
[134888] High CVE-2012-2855: Use-after-free in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.
[134954] [135264] High CVE-2012-2856: Out-of-bounds writes in PDF viewer. Credit to Mateusz Jurczyk of Google Security Team, with contributions by Gynvael Coldwind of Google Security Team.[$1000]
[136235] High CVE-2012-2857: Use-after-free in CSS DOM. Credit to Arthur Gerkis.[$1000]
[136894] High CVE-2012-2858: Buffer overflow in WebP decoder. Credit to Jüri Aedla.
[Linux only] [137541] Critical CVE-2012-2859: Crash in tab handling. Credit to Jeff Roberts of Google Security Team
[137671] Medium CVE-2012-2860: Out-of-bounds access when clicking in date picker. Credit to Chamal de Silva.Many of the above bugs were detected using AddressSanitizer.

We’d also like to thank Drew Yao / Braden Thomas / Jim Smith (all Apple Product Security), Kostya Serebryany of the Chromium development community, Atte Kettunen of OUSPG and Bernhard Bauer of the Chromium development community for working with us during the development cycle and preventing security regressions from ever reaching the stable channel.

Full details about what changes are in this release are available in the SVNrevisionlog. Interestedinhoppingon the stable channel?  Find out how.  If you find a new issue, please let us know by filing a bug.

Inserisci un commento sul forum Commenta la News sul Forum

Voto:

Categoria: P2P e Web

Licenza: Open source

OS: Windows, Linux, OS X

La Community di SWZone.it

La community con le risposte che cerchi ! Partecipa é gratis !
Iscrizione ForumIscriviti al Forum

Newsletter

Vuoi ricevere tutti gli aggiornamenti di SWZone direttamente via mail ?
Iscrizione NewsletterIscriviti alla Newsletter

News Collegate