Package chromium-gnome: Information

    Binary package: chromium-gnome
    Version: 84.0.4147.89-alt1
    Architecture: i586
    Build time:  Jul 26, 2020, 07:49 PM in the task #255175
    Source package: chromium
    Category: Networking/WWW
    Report package bug
    License: BSD-3-Clause and LGPL-2.1+
    Summary: Update to chromium to use Gnome keyring to store passwords
    Description: 
    By using the update-alternatives the password store for Chromium is
    changed to utilize Gnome's Keyring. Please be aware that by this change
    the old password are no longer accessible and are also not converted
    to Gnome's Keyring.

    Maintainer: Alexey Gladkov


    Last changed


    July 15, 2020 Alexey Gladkov 84.0.4147.89-alt1
    - New version (84.0.4147.89).
    - Fix compilation with system ffmpeg 4.3 (ALT#38716)
    - Security fixes:
      - CVE-2020-6510: Heap buffer overflow in background fetch.
      - CVE-2020-6511: Side-channel information leakage in content security policy.
      - CVE-2020-6512: Type Confusion in V8.
      - CVE-2020-6513: Heap buffer overflow in PDFium.
      - CVE-2020-6514: Inappropriate implementation in WebRTC.
      - CVE-2020-6515: Use after free in tab strip.
      - CVE-2020-6516: Policy bypass in CORS.
      - CVE-2020-6517: Heap buffer overflow in history.
      - CVE-2020-6518: Use after free in developer tools.
      - CVE-2020-6519: Policy bypass in CSP.
      - CVE-2020-6520: Heap buffer overflow in Skia.
      - CVE-2020-6521: Side-channel information leakage in autofill.
      - CVE-2020-6522: Inappropriate implementation in external protocol handlers.
      - CVE-2020-6523: Out of bounds write in Skia.
      - CVE-2020-6524: Heap buffer overflow in WebAudio.
      - CVE-2020-6525: Heap buffer overflow in Skia.
      - CVE-2020-6526: Inappropriate implementation in iframe sandbox.
      - CVE-2020-6527: Insufficient policy enforcement in CSP.
      - CVE-2020-6528: Incorrect security UI in basic auth.
      - CVE-2020-6529: Inappropriate implementation in WebRTC.
      - CVE-2020-6530: Out of bounds memory access in developer tools.
      - CVE-2020-6531: Side-channel information leakage in scroll to text.
      - CVE-2020-6533: Type Confusion in V8.
      - CVE-2020-6534: Heap buffer overflow in WebRTC.
      - CVE-2020-6535: Insufficient data validation in WebUI.
      - CVE-2020-6536: Incorrect security UI in PWAs.
    June 29, 2020 Andrey Cherepanov 83.0.4103.61-alt2
    - Prevent ignored null byte warning in Flash plugin version detection.
    - Add default parameters to system-wide variable $CHROMIUM_FLAGS.
    - Use Chromium name in GenericName in desktop file (ALT #36815).
    - Exclude armh from build.
    May 21, 2020 Alexey Gladkov 83.0.4103.61-alt1
    - New version (83.0.4103.61).
    - Security fixes:
      - CVE-2020-6465: Use after free in reader mode.
      - CVE-2020-6466: Use after free in media.
      - CVE-2020-6467: Use after free in WebRTC.
      - CVE-2020-6468: Type Confusion in V8.
      - CVE-2020-6469: Insufficient policy enforcement in developer tools.
      - CVE-2020-6470: Insufficient validation of untrusted input in clipboard.
      - CVE-2020-6471: Insufficient policy enforcement in developer tools.
      - CVE-2020-6472: Insufficient policy enforcement in developer tools.
      - CVE-2020-6473: Insufficient policy enforcement in Blink.
      - CVE-2020-6474: Use after free in Blink.
      - CVE-2020-6475: Incorrect security UI in full screen.
      - CVE-2020-6476: Insufficient policy enforcement in tab strip.
      - CVE-2020-6477: Inappropriate implementation in installer.
      - CVE-2020-6478: Inappropriate implementation in full screen.
      - CVE-2020-6479: Inappropriate implementation in sharing.
      - CVE-2020-6480: Insufficient policy enforcement in enterprise.
      - CVE-2020-6481: Insufficient policy enforcement in URL formatting.
      - CVE-2020-6482: Insufficient policy enforcement in developer tools.
      - CVE-2020-6483: Insufficient policy enforcement in payments.
      - CVE-2020-6484: Insufficient data validation in ChromeDriver.
      - CVE-2020-6485: Insufficient data validation in media router.
      - CVE-2020-6486: Insufficient policy enforcement in navigations.
      - CVE-2020-6487: Insufficient policy enforcement in downloads.
      - CVE-2020-6488: Insufficient policy enforcement in downloads.
      - CVE-2020-6489: Inappropriate implementation in developer tools.
      - CVE-2020-6490: Insufficient data validation in loader.
      - CVE-2020-6491: Incorrect security UI in site information.