- Easier searching by image
- A number of new apps/extension APIs
- Lots of under the hood changes for stability and performance
You can read more about these changes at the Google Chrome Blog.
Security Fixes and Rewards
Note: Access to bug details and links may be kept restricted until a majority of users are updated with a fix. We will also retain restrictions if the bug exists in a third party library that other projects similarly depend on, but haven’t yet fixed.
This update includes 50 security fixes. Below, we highlight some fixes that were either contributed by external researchers or particularly interesting. Please see the Chromium security page for more information.
-  Medium CVE-2013-2907: Out of bounds read in Window.prototype object. Credit to Boris Zbarsky.
- [$500] Medium CVE-2013-2910: Use-after-free in Web Audio. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC).
- [$1000] High CVE-2013-2911: Use-after-free in XSLT. Credit to Atte Kettunen of OUSPG.
- [$1000] High CVE-2013-2912: Use-after-free in PPAPI. Credit to Chamal de Silva and 41.w4r10r(at)garage4hackers.com.
- [$1000] High CVE-2013-2913: Use-after-free in XML document parsing. Credit to cloudfuzzer.
- [$1000] High CVE-2013-2914: Use after free in the Windows color chooser dialog. Credit to Khalil Zhani.
-  Low CVE-2013-2915: Address bar spoofing via a malformed scheme. Credit to Wander Groeneveld.
- [$500] Medium CVE-2013-2917: Out of bounds read in Web Audio. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC).
- [$1000] High CVE-2013-2918: Use-after-free in DOM. Credit to Byoungyoung Lee of Georgia Tech Information Security Center (GTISC).
- [$1000] High CVE-2013-2919: Memory corruption in V8. Credit to Adam Haile of Concrete Data.
-  Medium CVE-2013-2920: Out of bounds read in URL parsing. Credit to Atte Kettunen of OUSPG.
- [$1000] High CVE-2013-2921: Use-after-free in resource loader. Credit to Byoungyoung Lee and Tielei Wang of Georgia Tech Information Security Center (GTISC).
- [$2000] High CVE-2013-2922: Use-after-free in template element. Credit to Jon Butler.
As usual, our ongoing internal security work responsible for a wide range of fixes:
-  CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives (Chrome 30).
We would also like to thank Atte Kettunen, cloudfuzzer and miaubiz for working with us during the development cycle to prevent security bugs from ever reaching the stable channel. $8000 in additional rewards were issued.
Many of the above bugs were detected using AddressSanitizer. The security issue in V8 is fixed in 18.104.22.168.