معرفی شرکت ها


chromium-gost-kde-83.0.4103.61-alt4.0.mips2.mipsel.rpm


Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر
Card image cap
تبلیغات ما

مشتریان به طور فزاینده ای آنلاین هستند. تبلیغات می تواند به آنها کمک کند تا کسب و کار شما را پیدا کنند.

مشاهده بیشتر

توضیحات

Update to chromium to use KDE's kwallet to store passwords
ویژگی مقدار
سیستم عامل Linux
توزیع ALT p9
مخزن ALTLinux classic mipsel
نام بسته chromium-gost-kde
نام فایل بسته chromium-gost-kde-83.0.4103.61-alt4.0.mips2.mipsel.rpm
نسخه بسته 83.0.4103.61
انتشار بسته alt4.0.mips2
معماری بسته mipsel
نگهدارنده -
تاریخ ساخت Sun 11 Oct 2020 02
هاست سازنده iv-p9_mipsel.hasher.altlinux.org
نوع بسته .rpm
آدرس صفحه اصلی http://www.chromium.org
مجوز BSD-3-Clause and LGPL-2.1+
حجم دانلود 83K
حجم نصب 67.000
By using the update-alternatives the password store for Chromium is changed to utilize KDE's kwallet. Please be aware that by this change the old password are no longer accessible and are also not converted to kwallet.


نیازمندی

مقدار نام
= 83.0.4103.61 chromium-gost
= 83.0.4103.61-alt4.0.mips2:p9_mipsel+51943.100.1.1 chromium-gost
- rpmlib(PayloadIsLzma)


ارائه دهنده

مقدار نام
= 83.0.4103.61 chromium-password
= 83.0.4103.61 chromium-desktop-kde
= 15 /usr/bin/chromium-gost
= 83.0.4103.61-alt4.0.mips2:p9_mipsel+51943.100.1.1 chromium-gost-kde


نحوه نصب


نصب پکیج rpm chromium-gost-kde:

    sudo apt-get install chromium-gost-kde-83.0.4103.61-alt4.0.mips2.mipsel.rpm


فایل ها

مسیرها
/etc/alternatives/packages.d/chromium-gost-kde
/usr/lib/chromium-gost/chromium-gost-kde


گزارش تغییرات

تاریخ آخرین تغییر جزئیات
2020-10-09

Disable hardware acceleration by default
Workaround unaligned access to large fields in v8

2020-08-25

Build on mipsel.

2020-07-22

Fix typo in start script

2020-07-14

Build GOST version

2020-06-29

Prevent ignored null byte warning in Flash plugin version detection.
Add default parameters to system-wide variable $CHROMIUM_FLAGS.
Use Chromium name in GenericName in desktop file (ALT #36815).
Exclude armh from build.

2020-05-21

New version (83.0.4103.61).
Security fixes:
CVE-2020-6465: Use after free in reader mode.
CVE-2020-6466: Use after free in media.
CVE-2020-6467: Use after free in WebRTC.
CVE-2020-6468: Type Confusion in V8.
CVE-2020-6469: Insufficient policy enforcement in developer tools.
CVE-2020-6470: Insufficient validation of untrusted input in clipboard.
CVE-2020-6471: Insufficient policy enforcement in developer tools.
CVE-2020-6472: Insufficient policy enforcement in developer tools.
CVE-2020-6473: Insufficient policy enforcement in Blink.
CVE-2020-6474: Use after free in Blink.
CVE-2020-6475: Incorrect security UI in full screen.
CVE-2020-6476: Insufficient policy enforcement in tab strip.
CVE-2020-6477: Inappropriate implementation in installer.
CVE-2020-6478: Inappropriate implementation in full screen.
CVE-2020-6479: Inappropriate implementation in sharing.
CVE-2020-6480: Insufficient policy enforcement in enterprise.
CVE-2020-6481: Insufficient policy enforcement in URL formatting.
CVE-2020-6482: Insufficient policy enforcement in developer tools.
CVE-2020-6483: Insufficient policy enforcement in payments.
CVE-2020-6484: Insufficient data validation in ChromeDriver.
CVE-2020-6485: Insufficient data validation in media router.
CVE-2020-6486: Insufficient policy enforcement in navigations.
CVE-2020-6487: Insufficient policy enforcement in downloads.
CVE-2020-6488: Insufficient policy enforcement in downloads.
CVE-2020-6489: Inappropriate implementation in developer tools.
CVE-2020-6490: Insufficient data validation in loader.
CVE-2020-6491: Incorrect security UI in site information.

2020-05-13

New version (81.0.4044.138).
Security fixes:
CVE-2020-6464: Type Confusion in Blink.
CVE-2020-6831: Stack buffer overflow in SCTP.
CVE-2020-6461: Use after free in storage.
CVE-2020-6462: Use after free in task scheduling.
CVE-2020-6458: Out of bounds read and write in PDFium.
CVE-2020-6459: Use after free in payments.
CVE-2020-6460: Insufficient data validation in URL formatting.
CVE-2020-6463: Use after free in ANGLE.

2020-04-23

Fix startup script

2020-03-06

New version (80.0.3987.132).
Security fixes:
CVE-2019-18197: Multiple vulnerabilities in XML.
CVE-2019-19923: Out of bounds memory access in SQLite.
CVE-2019-19925: Multiple vulnerabilities in SQLite.
CVE-2019-19926: Inappropriate implementation in SQLite.
CVE-2020-6381: Integer overflow in JavaScript.
CVE-2020-6382: Type Confusion in JavaScript.
CVE-2020-6383: Type confusion in V8.
CVE-2020-6384: Use after free in WebAudio.
CVE-2020-6385: Insufficient policy enforcement in storage.
CVE-2020-6386: Use after free in speech.
CVE-2020-6387: Out of bounds write in WebRTC.
CVE-2020-6388: Out of bounds memory access in WebAudio.
CVE-2020-6389: Out of bounds write in WebRTC.
CVE-2020-6390: Out of bounds memory access in streams.
CVE-2020-6391: Insufficient validation of untrusted input in Blink.
CVE-2020-6392: Insufficient policy enforcement in extensions.
CVE-2020-6393: Insufficient policy enforcement in Blink.
CVE-2020-6394: Insufficient policy enforcement in Blink.
CVE-2020-6395: Out of bounds read in JavaScript.
CVE-2020-6396: Inappropriate implementation in Skia.
CVE-2020-6397: Incorrect security UI in sharing.
CVE-2020-6398: Uninitialized use in PDFium.
CVE-2020-6399: Insufficient policy enforcement in AppCache.
CVE-2020-6400: Inappropriate implementation in CORS.
CVE-2020-6401: Insufficient validation of untrusted input in Omnibox.
CVE-2020-6402: Insufficient policy enforcement in downloads.
CVE-2020-6403: Incorrect security UI in Omnibox.
CVE-2020-6404: Inappropriate implementation in Blink.
CVE-2020-6405: Out of bounds read in SQLite.
CVE-2020-6406: Use after free in audio.
CVE-2020-6407: Out of bounds memory access in streams.
CVE-2020-6408: Insufficient policy enforcement in CORS.
CVE-2020-6409: Inappropriate implementation in Omnibox.
CVE-2020-6410: Insufficient policy enforcement in navigation.
CVE-2020-6411: Insufficient validation of untrusted input in Omnibox.
CVE-2020-6412: Insufficient validation of untrusted input in Omnibox.
CVE-2020-6413: Inappropriate implementation in Blink.
CVE-2020-6414: Insufficient policy enforcement in Safe Browsing.
CVE-2020-6415: Inappropriate implementation in JavaScript.
CVE-2020-6416: Insufficient data validation in streams.
CVE-2020-6417: Inappropriate implementation in installer.
CVE-2020-6418: Type confusion in V8.
CVE-2020-6420: Insufficient policy enforcement in media.

2020-02-03

New version (79.0.3945.130).
Security fixes:
CVE-2019-13767: Use after free in media picker.
CVE-2020-6377: Use after free in audio.
CVE-2020-6378: Use-after-free in speech recognizer.
CVE-2020-6379: Use-after-free in speech recognizer.
CVE-2020-6380: Extension message verification error.

2019-12-16

New version (79.0.3945.79).
Security fixes:
CVE-2019-13725: Use after free in Bluetooth.
CVE-2019-13726: Heap buffer overflow in password manager.
CVE-2019-13727: Insufficient policy enforcement in WebSockets.
CVE-2019-13728: Out of bounds write in V8.
CVE-2019-13729: Use after free in WebSockets.
CVE-2019-13730: Type Confusion in V8.
CVE-2019-13732: Use after free in WebAudio.
CVE-2019-13734: Out of bounds write in SQLite.
CVE-2019-13735: Out of bounds write in V8.
CVE-2019-13736: Integer overflow in PDFium.
CVE-2019-13737: Insufficient policy enforcement in autocomplete.
CVE-2019-13738: Insufficient policy enforcement in navigation.
CVE-2019-13739: Incorrect security UI in Omnibox.
CVE-2019-13740: Incorrect security UI in sharing.
CVE-2019-13741: Insufficient validation of untrusted input in Blink.
CVE-2019-13742: Incorrect security UI in Omnibox.
CVE-2019-13743: Incorrect security UI in external protocol handling.
CVE-2019-13744: Insufficient policy enforcement in cookies.
CVE-2019-13745: Insufficient policy enforcement in audio.
CVE-2019-13746: Insufficient policy enforcement in Omnibox.
CVE-2019-13747: Uninitialized Use in rendering.
CVE-2019-13748: Insufficient policy enforcement in developer tools.
CVE-2019-13749: Incorrect security UI in Omnibox.
CVE-2019-13750: Insufficient data validation in SQLite.
CVE-2019-13751: Uninitialized Use in SQLite.
CVE-2019-13752: Out of bounds read in SQLite.
CVE-2019-13753: Out of bounds read in SQLite.
CVE-2019-13754: Insufficient policy enforcement in extensions.
CVE-2019-13755: Insufficient policy enforcement in extensions.
CVE-2019-13756: Incorrect security UI in printing.
CVE-2019-13757: Incorrect security UI in Omnibox.
CVE-2019-13758: Insufficient policy enforcement in navigation.
CVE-2019-13759: Incorrect security UI in interstitials.
CVE-2019-13761: Incorrect security UI in Omnibox.
CVE-2019-13762: Insufficient policy enforcement in downloads.
CVE-2019-13763: Insufficient policy enforcement in payments.
CVE-2019-13764: Type Confusion in V8.

2019-12-02

New version (78.0.3904.108).
Security fixes:
CVE-2019-13723: Use-after-free in Bluetooth.
CVE-2019-13724: Out-of-bounds access in Bluetooth.

2019-11-09

New version (78.0.3904.97).
Security fixes:
CVE-2019-13720: Use-after-free in audio.
CVE-2019-13721: Use-after-free in PDFium.

2019-10-24

New version (78.0.3904.70).
Security fixes:
CVE-2019-13699: Use-after-free in media.
CVE-2019-13700: Buffer overrun in Blink.
CVE-2019-13701: URL spoof in navigation.
CVE-2019-13702: Privilege elevation in Installer.
CVE-2019-13703: URL bar spoofing.
CVE-2019-13704: CSP bypass.
CVE-2019-13705: Extension permission bypass.
CVE-2019-13706: Out-of-bounds read in PDFium.
CVE-2019-13707: File storage disclosure.
CVE-2019-13708: HTTP authentication spoof.
CVE-2019-13709: File download protection bypass.
CVE-2019-13710: File download protection bypass.
CVE-2019-13711: Cross-context information leak.
CVE-2019-13713: Cross-origin data leak.
CVE-2019-13714: CSS injection.
CVE-2019-13715: Address bar spoofing.
CVE-2019-13716: Service worker state error.
CVE-2019-13717: Notification obscured.
CVE-2019-13718: IDN spoof.
CVE-2019-13719: Notification obscured.
CVE-2019-15903: Buffer overflow in expat.

2019-10-21

New version (77.0.3865.120).
Security fixes:
CVE-2019-13693: Use-after-free in IndexedDB.
CVE-2019-13694: Use-after-free in WebRTC.
CVE-2019-13695: Use-after-free in audio.
CVE-2019-13696: Use-after-free in V8.
CVE-2019-13697: Cross-origin size leak.

2019-09-25

New version (77.0.3865.90).
Security fixes:
CVE-2019-13685: Use-after-free in UI.
CVE-2019-13686: Use-after-free in offline pages.
CVE-2019-13687: Use-after-free in media.
CVE-2019-13688: Use-after-free in media.