Пакет chromium: Информация
Default inline alert: Версия в репозитории: 119.0.6045.159-alt0.p10.1
Исходный пакет: chromium
Версия: 76.0.3809.87-alt1
Собран: 8 августа 2019 г. 5:10 в задании #235554
Категория: Сети/WWW
Сообщить об ошибке в пакетеДомашняя страница: http://www.chromium.org
Лицензия: BSD-3-Clause and LGPL-2.1+
О пакете: An open source web browser developed by Google
Описание:
Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all Internet users to experience the web.
Список rpm-пакетов, предоставляемых данным srpm-пакетом:
chromium (x86_64, i586, aarch64)
chromium-debuginfo (x86_64, i586, aarch64)
chromium-gnome (x86_64, i586, aarch64)
chromium-kde (x86_64, i586, aarch64)
chromium (x86_64, i586, aarch64)
chromium-debuginfo (x86_64, i586, aarch64)
chromium-gnome (x86_64, i586, aarch64)
chromium-kde (x86_64, i586, aarch64)
Сопровождающий: Alexey Gladkov
Последнее изменение
2 августа 2019 г. Alexey Gladkov 76.0.3809.87-alt1
- New version (76.0.3809.87). - Security fixes: - CVE-2019-5850: Use-after-free in offline page fetcher. - CVE-2019-5851: Use-after-poison in offline audio context. - CVE-2019-5852: Object leak of utility functions. - CVE-2019-5853: Memory corruption in regexp length check. - CVE-2019-5854: Integer overflow in PDFium text rendering. - CVE-2019-5855: Integer overflow in PDFium. - CVE-2019-5856: Insufficient checks on filesystem: URI permissions. - CVE-2019-5857: Comparison of -0 and null yields crash. - CVE-2019-5858: Insufficient filtering of Open URL service parameters. - CVE-2019-5859: res: URIs can load alternative browsers. - CVE-2019-5860: Use-after-free in PDFium. - CVE-2019-5861: Click location incorrectly checked. - CVE-2019-5862: AppCache not robust to compromised renderers. - CVE-2019-5863: Use-after-free in WebUSB on Windows. - CVE-2019-5864: Insufficient port filtering in CORS for extensions. - CVE-2019-5865: Site isolation bypass from compromised renderer.
3 мая 2019 г. Alexey Gladkov 74.0.3729.131-alt1
- New version (74.0.3729.131). - Security fixes: - CVE-2019-5805: Use after free in PDFium. - CVE-2019-5806: Integer overflow in Angle. - CVE-2019-5807: Memory corruption in V8. - CVE-2019-5808: Use after free in Blink. - CVE-2019-5809: Use after free in Blink. - CVE-2019-5810: User information disclosure in Autofill. - CVE-2019-5811: CORS bypass in Blink. - CVE-2019-5812: URL spoof in Omnibox on iOS. - CVE-2019-5813: Out of bounds read in V8. - CVE-2019-5814: CORS bypass in Blink. - CVE-2019-5815: Heap buffer overflow in Blink. - CVE-2019-5816: Exploit persistence extension on Android. - CVE-2019-5817: Heap buffer overflow in Angle on Windows. - CVE-2019-5818: Uninitialized value in media reader. - CVE-2019-5819: Incorrect escaping in developer tools. - CVE-2019-5820: Integer overflow in PDFium. - CVE-2019-5821: Integer overflow in PDFium. - CVE-2019-5822: CORS bypass in download manager. - CVE-2019-5823: Forced navigation from service worker. - CVE-2019-5824: Parameter passing error in media player. - CVE-2019-5825: Out-of-bounds write in V8 - CVE-2019-5826: Use-after-free in IndexedDB - CVE-2019-5827: Out-of-bounds access in SQLite.
18 марта 2019 г. Alexey Gladkov 73.0.3683.75-alt1
- New version (73.0.3683.75). - Security fixes: - CVE-2019-5787: Use after free in Canvas. - CVE-2019-5788: Use after free in FileAPI. - CVE-2019-5789: Use after free in WebMIDI. - CVE-2019-5790: Heap buffer overflow in V8. - CVE-2019-5791: Type confusion in V8. - CVE-2019-5792: Integer overflow in PDFium. - CVE-2019-5793: Excessive permissions for private API in Extensions. - CVE-2019-5794: Security UI spoofing. - CVE-2019-5795: Integer overflow in PDFium. - CVE-2019-5796: Race condition in Extensions. - CVE-2019-5797: Race condition in DOMStorage. - CVE-2019-5798: Out of bounds read in Skia. - CVE-2019-5799: CSP bypass with blob URL. - CVE-2019-5800: CSP bypass with blob URL. - CVE-2019-5801: Incorrect Omnibox display on iOS. - CVE-2019-5802: Security UI spoofing. - CVE-2019-5803: CSP bypass with Javascript URLs'. - CVE-2019-5804: Command line command injection on Windows.