Package chromium: Information
Default inline alert: Version in the repository: 132.0.6834.83-alt1
Source package: chromium
Version: 131.0.6778.264-alt1
Build time: Jan 10, 2025, 08:29 PM in the task #368503
Category: Networking/WWW
Report package bugHome page: https://www.chromium.org
License: BSD-3-Clause and LGPL-2.1+
Summary: An open source web browser developed by Google
Description:
Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all Internet users to experience the web.
Maintainer: Andrew A. Vasilyev
List of contributors:
Andrew A. Vasilyev
Andrey Cherepanov
Alexey Gladkov
Konstantin Lepikhov
Dmitriy Kulik
Andrew A. Vasilyev
Andrey Cherepanov
Alexey Gladkov
Konstantin Lepikhov
Dmitriy Kulik
Last changed
Jan. 9, 2025 Andrew A. Vasilyev 131.0.6778.264-alt1
- New version (131.0.6778.264). - Security fixes: + CVE-2025-0291: Type Confusion in V8
Dec. 20, 2024 Andrew A. Vasilyev 131.0.6778.204-alt1
- New version (131.0.6778.204). - Security fixes: + CVE-2024-12692: Type Confusion in V8 + CVE-2024-12693: Out of bounds memory access in V8 + CVE-2024-12694: Use after free in Compositing + CVE-2024-12695: Out of bounds write in V8 + CVE-2024-12381: Type Confusion in V8 + CVE-2024-12382: Use after free in Translate + CVE-2024-12053: Type Confusion in V8 + CVE-2024-11395: Type Confusion in V8 + CVE-2024-11110: Inappropriate implementation in Blink. + CVE-2024-11111: Inappropriate implementation in Autofill. + CVE-2024-11113: Use after free in Accessibility. + CVE-2024-11116: Inappropriate implementation in Paint. + CVE-2024-11117: Inappropriate implementation in FileSystem. + CVE-2024-10826: Use after free in Family Experiences + CVE-2024-10827: Use after free in Serial + CVE-2024-10487: Out of bounds write in Dawn + CVE-2024-10488: Use after free in WebRTC
Dec. 16, 2024 Andrey Cherepanov 130.0.6723.69-alt1
- New version (130.0.6723.69). - Build with llvm19.1 and libcxx, not libstdc++ (thanks andy@). - Build only for x86_64. - Security fixes: + CVE-2024-10229: Inappropriate implementation in Extensions + CVE-2024-10230: Type Confusion in V8 + CVE-2024-10231: Type Confusion in V8 + CVE-2024-9954: Use after free in AI + CVE-2024-9955: Use after free in Web Authentication + CVE-2024-9956: Inappropriate implementation in Web Authentication + CVE-2024-9957: Use after free in UI + CVE-2024-9958: Inappropriate implementation in PictureInPicture + CVE-2024-9959: Use after free in DevTools + CVE-2024-9960: Use after free in Dawn + CVE-2024-9961: Use after free in Parcel Tracking + CVE-2024-9962: Inappropriate implementation in Permissions + CVE-2024-9963: Insufficient data validation in Downloads + CVE-2024-9964: Inappropriate implementation in Payments + CVE-2024-9965: Insufficient data validation in DevTools + CVE-2024-9966: Inappropriate implementation in Navigations + CVE-2024-9602: Type Confusion in V8 + CVE-2024-9603: Type Confusion in V8 + CVE-2024-7025: Integer overflow in Layout + CVE-2024-9369: Insufficient data validation in Mojo + CVE-2024-9370: Inappropriate implementation in V8 + CVE-2024-9120: Use after free in Dawn + CVE-2024-9121: Inappropriate implementation in V8 + CVE-2024-9122: Type Confusion in V8 + CVE-2024-9123: Integer overflow in Skia + CVE-2024-8904: Type Confusion in V8 + CVE-2024-8905: Inappropriate implementation in V8 + CVE-2024-8906: Incorrect security UI in Downloads + CVE-2024-8907: Insufficient data validation in Omnibox + CVE-2024-8908: Inappropriate implementation in Autofill + CVE-2024-8909: Inappropriate implementation in UI + CVE-2024-8636: Heap buffer overflow in Skia + CVE-2024-8637: Use after free in Media Router + CVE-2024-8638: Type Confusion in V8 + CVE-2024-8639: Use after free in Autofill + CVE-2024-8362: Use after free in WebAudio + CVE-2024-7970: Out of bounds write in V8 + CVE-2024-7969: Type Confusion in V8 + CVE-2024-8193: Heap buffer overflow in Skia + CVE-2024-8194: Type Confusion in V8 + CVE-2024-8198: Heap buffer overflow in Skia + CVE-2024-7964: Use after free in Passwords + CVE-2024-7965: Inappropriate implementation in V8 + CVE-2024-7966: Out of bounds memory access in Skia + CVE-2024-7967: Heap buffer overflow in Fonts + CVE-2024-7968: Use after free in Autofill + CVE-2024-7969: Type Confusion in V8 + CVE-2024-7971: Type confusion in V8 + CVE-2024-7972: Inappropriate implementation in V8 + CVE-2024-7973: Heap buffer overflow in PDFium + CVE-2024-7974: Insufficient data validation in V8 API + CVE-2024-7975: Inappropriate implementation in Permissions + CVE-2024-7976: Inappropriate implementation in FedCM + CVE-2024-7977: Insufficient data validation in Installer + CVE-2024-7978: Insufficient policy enforcement in Data Transfer + CVE-2024-7979: Insufficient data validation in Installer + CVE-2024-7980: Insufficient data validation in Installer + CVE-2024-7981: Inappropriate implementation in Views + CVE-2024-8033: Inappropriate implementation in WebApp Installs + CVE-2024-8034: Inappropriate implementation in Custom Tabs + CVE-2024-8035: Inappropriate implementation in Extensions + CVE-2024-7532: Out of bounds memory access in ANGLE + CVE-2024-7533: Use after free in Sharing + CVE-2024-7550: Type Confusion in V8 + CVE-2024-7534: Heap buffer overflow in Layout + CVE-2024-7535: Inappropriate implementation in V8 + CVE-2024-7536: Use after free in WebAudio + CVE-2024-6988: Use after free in Downloads + CVE-2024-6989: Use after free in Loader + CVE-2024-6991: Use after free in Dawn + CVE-2024-6992: Out of bounds memory access in ANGLE + CVE-2024-6993: Inappropriate implementation in Canvas + CVE-2024-6994: Heap buffer overflow in Layout + CVE-2024-6995: Inappropriate implementation in Fullscreen + CVE-2024-6996: Race in Frames + CVE-2024-6997: Use after free in Tabs + CVE-2024-6998: Use after free in User Education + CVE-2024-6999: Inappropriate implementation in FedCM + CVE-2024-7000: Use after free in CSS. Reported by Anonymous + CVE-2024-7001: Inappropriate implementation in HTML + CVE-2024-7003: Inappropriate implementation in FedCM + CVE-2024-7004: Insufficient validation of untrusted input in Safe Browsing + CVE-2024-7005: Insufficient validation of untrusted input in Safe Browsing + CVE-2024-6990: Uninitialized Use in Dawn + CVE-2024-7255: Out of bounds read in WebTransport + CVE-2024-7256: Insufficient data validation in Dawn