Пакет chromium-gost-kde: Информация
Бинарный пакет: chromium-gost-kde
Версия: 83.0.4103.61-alt3
Архитектура: aarch64
Собран: 21 июля 2020 г. 17:01 в задании #255177
Исходный пакет: chromium-gost
Категория: Сети/WWW
Сообщить об ошибке в пакетеДомашняя страница: http://www.chromium.org
Лицензия: BSD-3-Clause and LGPL-2.1+
О пакете: Update to chromium to use KDE's kwallet to store passwords
Описание:
By using the update-alternatives the password store for Chromium is changed to utilize KDE's kwallet. Please be aware that by this change the old password are no longer accessible and are also not converted to kwallet.
Сопровождающий: George V. Kouryachy
Список участников:
George V. Kouryachy
Andrey Cherepanov
Alexey Gladkov
Konstantin Lepikhov
Dmitriy Kulik
George V. Kouryachy
Andrey Cherepanov
Alexey Gladkov
Konstantin Lepikhov
Dmitriy Kulik
Последнее изменение
14 июля 2020 г. George V. Kouryachy 83.0.4103.61-alt3
- Build GOST version
29 июня 2020 г. Andrey Cherepanov 83.0.4103.61-alt2
- Prevent ignored null byte warning in Flash plugin version detection. - Add default parameters to system-wide variable $CHROMIUM_FLAGS. - Use Chromium name in GenericName in desktop file (ALT #36815). - Exclude armh from build.
21 мая 2020 г. Alexey Gladkov 83.0.4103.61-alt1
- New version (83.0.4103.61). - Security fixes: - CVE-2020-6465: Use after free in reader mode. - CVE-2020-6466: Use after free in media. - CVE-2020-6467: Use after free in WebRTC. - CVE-2020-6468: Type Confusion in V8. - CVE-2020-6469: Insufficient policy enforcement in developer tools. - CVE-2020-6470: Insufficient validation of untrusted input in clipboard. - CVE-2020-6471: Insufficient policy enforcement in developer tools. - CVE-2020-6472: Insufficient policy enforcement in developer tools. - CVE-2020-6473: Insufficient policy enforcement in Blink. - CVE-2020-6474: Use after free in Blink. - CVE-2020-6475: Incorrect security UI in full screen. - CVE-2020-6476: Insufficient policy enforcement in tab strip. - CVE-2020-6477: Inappropriate implementation in installer. - CVE-2020-6478: Inappropriate implementation in full screen. - CVE-2020-6479: Inappropriate implementation in sharing. - CVE-2020-6480: Insufficient policy enforcement in enterprise. - CVE-2020-6481: Insufficient policy enforcement in URL formatting. - CVE-2020-6482: Insufficient policy enforcement in developer tools. - CVE-2020-6483: Insufficient policy enforcement in payments. - CVE-2020-6484: Insufficient data validation in ChromeDriver. - CVE-2020-6485: Insufficient data validation in media router. - CVE-2020-6486: Insufficient policy enforcement in navigations. - CVE-2020-6487: Insufficient policy enforcement in downloads. - CVE-2020-6488: Insufficient policy enforcement in downloads. - CVE-2020-6489: Inappropriate implementation in developer tools. - CVE-2020-6490: Insufficient data validation in loader. - CVE-2020-6491: Incorrect security UI in site information.