Package chromium-gost-kde: Information

    Binary package: chromium-gost-kde
    Version: 83.0.4103.61-alt3
    Architecture: aarch64
    Build time:  Jul 21, 2020, 05:01 PM in the task #255177
    Source package: chromium-gost
    Category: Networking/WWW
    Report package bug
    License: BSD-3-Clause and LGPL-2.1+
    Summary: Update to chromium to use KDE's kwallet to store passwords
    Description: 
    By using the update-alternatives the password store for Chromium is
    changed to utilize KDE's kwallet. Please be aware that by this change
    the old password are no longer accessible and are also not converted
    to kwallet.

    Maintainer: George V. Kouryachy


    Last changed


    July 14, 2020 George V. Kouryachy 83.0.4103.61-alt3
    - Build GOST version
    June 29, 2020 Andrey Cherepanov 83.0.4103.61-alt2
    - Prevent ignored null byte warning in Flash plugin version detection.
    - Add default parameters to system-wide variable $CHROMIUM_FLAGS.
    - Use Chromium name in GenericName in desktop file (ALT #36815).
    - Exclude armh from build.
    May 21, 2020 Alexey Gladkov 83.0.4103.61-alt1
    - New version (83.0.4103.61).
    - Security fixes:
      - CVE-2020-6465: Use after free in reader mode.
      - CVE-2020-6466: Use after free in media.
      - CVE-2020-6467: Use after free in WebRTC.
      - CVE-2020-6468: Type Confusion in V8.
      - CVE-2020-6469: Insufficient policy enforcement in developer tools.
      - CVE-2020-6470: Insufficient validation of untrusted input in clipboard.
      - CVE-2020-6471: Insufficient policy enforcement in developer tools.
      - CVE-2020-6472: Insufficient policy enforcement in developer tools.
      - CVE-2020-6473: Insufficient policy enforcement in Blink.
      - CVE-2020-6474: Use after free in Blink.
      - CVE-2020-6475: Incorrect security UI in full screen.
      - CVE-2020-6476: Insufficient policy enforcement in tab strip.
      - CVE-2020-6477: Inappropriate implementation in installer.
      - CVE-2020-6478: Inappropriate implementation in full screen.
      - CVE-2020-6479: Inappropriate implementation in sharing.
      - CVE-2020-6480: Insufficient policy enforcement in enterprise.
      - CVE-2020-6481: Insufficient policy enforcement in URL formatting.
      - CVE-2020-6482: Insufficient policy enforcement in developer tools.
      - CVE-2020-6483: Insufficient policy enforcement in payments.
      - CVE-2020-6484: Insufficient data validation in ChromeDriver.
      - CVE-2020-6485: Insufficient data validation in media router.
      - CVE-2020-6486: Insufficient policy enforcement in navigations.
      - CVE-2020-6487: Insufficient policy enforcement in downloads.
      - CVE-2020-6488: Insufficient policy enforcement in downloads.
      - CVE-2020-6489: Inappropriate implementation in developer tools.
      - CVE-2020-6490: Insufficient data validation in loader.
      - CVE-2020-6491: Incorrect security UI in site information.