Пакет chromium-gost-kde: Информация

    Бинарный пакет: chromium-gost-kde
    Версия: 83.0.4103.61-alt3
    Архитектура: aarch64
    Собран:  21 июля 2020 г. 17:01 в задании #255177
    Исходный пакет: chromium-gost
    Категория: Сети/WWW
    Сообщить об ошибке в пакете
    Домашняя страница: http://www.chromium.org

    Лицензия: BSD-3-Clause and LGPL-2.1+
    О пакете: Update to chromium to use KDE's kwallet to store passwords
    Описание: 
    By using the update-alternatives the password store for Chromium is
    changed to utilize KDE's kwallet. Please be aware that by this change
    the old password are no longer accessible and are also not converted
    to kwallet.

    Сопровождающий: George V. Kouryachy


    Последнее изменение


    14 июля 2020 г. George V. Kouryachy 83.0.4103.61-alt3
    - Build GOST version
    29 июня 2020 г. Andrey Cherepanov 83.0.4103.61-alt2
    - Prevent ignored null byte warning in Flash plugin version detection.
    - Add default parameters to system-wide variable $CHROMIUM_FLAGS.
    - Use Chromium name in GenericName in desktop file (ALT #36815).
    - Exclude armh from build.
    21 мая 2020 г. Alexey Gladkov 83.0.4103.61-alt1
    - New version (83.0.4103.61).
    - Security fixes:
      - CVE-2020-6465: Use after free in reader mode.
      - CVE-2020-6466: Use after free in media.
      - CVE-2020-6467: Use after free in WebRTC.
      - CVE-2020-6468: Type Confusion in V8.
      - CVE-2020-6469: Insufficient policy enforcement in developer tools.
      - CVE-2020-6470: Insufficient validation of untrusted input in clipboard.
      - CVE-2020-6471: Insufficient policy enforcement in developer tools.
      - CVE-2020-6472: Insufficient policy enforcement in developer tools.
      - CVE-2020-6473: Insufficient policy enforcement in Blink.
      - CVE-2020-6474: Use after free in Blink.
      - CVE-2020-6475: Incorrect security UI in full screen.
      - CVE-2020-6476: Insufficient policy enforcement in tab strip.
      - CVE-2020-6477: Inappropriate implementation in installer.
      - CVE-2020-6478: Inappropriate implementation in full screen.
      - CVE-2020-6479: Inappropriate implementation in sharing.
      - CVE-2020-6480: Insufficient policy enforcement in enterprise.
      - CVE-2020-6481: Insufficient policy enforcement in URL formatting.
      - CVE-2020-6482: Insufficient policy enforcement in developer tools.
      - CVE-2020-6483: Insufficient policy enforcement in payments.
      - CVE-2020-6484: Insufficient data validation in ChromeDriver.
      - CVE-2020-6485: Insufficient data validation in media router.
      - CVE-2020-6486: Insufficient policy enforcement in navigations.
      - CVE-2020-6487: Insufficient policy enforcement in downloads.
      - CVE-2020-6488: Insufficient policy enforcement in downloads.
      - CVE-2020-6489: Inappropriate implementation in developer tools.
      - CVE-2020-6490: Insufficient data validation in loader.
      - CVE-2020-6491: Incorrect security UI in site information.