Пакет chromium-gnome: Информация

    Бинарный пакет: chromium-gnome
    Версия: 55.0.2883.75-alt1
    Архитектура: i586
    Собран:  8 декабря 2016 г. 18:57 в задании #174143
    Исходный пакет: chromium
    Категория: Сети/WWW
    Сообщить об ошибке в пакете
    Домашняя страница: http://www.chromium.org

    Лицензия: BSD-3-Clause and LGPL-2.1+
    О пакете: Update to chromium to use Gnome keyring to store passwords
    Описание: 
    By using the update-alternatives the password store for Chromium is
    changed to utilize Gnome's Keyring. Please be aware that by this change
    the old password are no longer accessible and are also not converted
    to Gnome's Keyring.

    Сопровождающий: Alexey Gladkov


    Последнее изменение


    8 декабря 2016 г. Alexey Gladkov 55.0.2883.75-alt1
    - New version (55.0.2883.75).
    - Security fixes:
      - CVE-2016-9651: Private property access in V8. Credit to Guang Gong of Alpha Team Of Qihoo 360
      - CVE-2016-5208: Universal XSS in Blink. Credit to Mariusz Mlynski
      - CVE-2016-5207: Universal XSS in Blink. Credit to Mariusz Mlynski
      - CVE-2016-5206: Same-origin bypass in PDFium. Credit to Rob Wu (robwu.nl)
      - CVE-2016-5205: Universal XSS in Blink. Credit to Anonymous
      - CVE-2016-5204: Universal XSS in Blink. Credit to Mariusz Mlynski
      - CVE-2016-5209: Out of bounds write in Blink. Credit to Giwan Go of STEALIEN
      - CVE-2016-5203: Use after free in PDFium. Credit to Anonymous
      - CVE-2016-5210: Out of bounds write in PDFium. Credit to Ke Liu of Tencent's Xuanwu LAB
      - CVE-2016-5212: Local file disclosure in DevTools. Credit to Khalil Zhani
      - CVE-2016-5211: Use after free in PDFium. Credit to Anonymous
      - CVE-2016-5213: Use after free in V8. Credit to Khalil Zhani
      - CVE-2016-5214: File download protection bypass. Credit to Jonathan Birch and MSVR
      - CVE-2016-5216: Use after free in PDFium. Credit to Anonymous
      - CVE-2016-5215: Use after free in Webaudio. Credit to Looben Yang
      - CVE-2016-5217: Use of unvalidated data in PDFium. Credit to Rob Wu (robwu.nl)
      - CVE-2016-5218: Address spoofing in Omnibox. Credit to Abdulrahman Alqabandi (@qab)
      - CVE-2016-5219: Use after free in V8. Credit to Rob Wu (robwu.nl)
      - CVE-2016-5221: Integer overflow in ANGLE. Credit to Tim Becker of ForAllSecure
      - CVE-2016-5220: Local file access in PDFium. Credit to Rob Wu (robwu.nl)
      - CVE-2016-5222: Address spoofing in Omnibox. Credit to xisigr of Tencent's Xuanwu Lab
      - CVE-2016-9650: CSP Referrer disclosure. Credit to Jakub Zoczek
      - CVE-2016-5223: Integer overflow in PDFium. Credit to Hwiwon Lee 
      - CVE-2016-5226: Limited XSS in Blink. Credit to Jun Kokatsu (@shhnjk)
      - CVE-2016-5225: CSP bypass in Blink. Credit to Scott Helme (@Scott_Helme, scotthelme.co.uk)
      - CVE-2016-5224: Same-origin bypass in SVG. Credit to Roeland Krak
      - CVE-2016-9652: Various fixes from internal audits, fuzzing and other initiatives
    30 октября 2016 г. Alexey Gladkov 54.0.2840.59-alt3
    - Fix Requires.
    - Add debuginfo.
    25 октября 2016 г. Alexey Gladkov 54.0.2840.59-alt2
    - Rename chromium-stable to chromium.
    - Enable VAAPI.