ALT Linux Bugzilla
– Attachment 6494 Details for
Bug 31805
Enable widevine to support DRM-protected content playback
New bug
|
Search
|
[?]
|
Help
Register
|
Log In
[x]
|
Forgot Password
Login:
[x]
|
EN
|
RU
chromium.spec
chromium.spec (text/plain), 56.31 KB, created by
Konstantin A Lepikhov (L.A. Kostis)
on 2016-02-16 15:53:47 MSK
(
hide
)
Description:
chromium.spec
Filename:
MIME Type:
Creator:
Konstantin A Lepikhov (L.A. Kostis)
Created:
2016-02-16 15:53:47 MSK
Size:
56.31 KB
patch
obsolete
>%set_verify_elf_method textrel=relaxed ># Disable cross-reference autoreq problem for shared libraries >%add_findreq_skiplist %_libdir/chromium/lib/lib*.so > >%def_disable debug >%def_disable nacl >%def_disable verbose >%def_disable clang >%def_enable shared_libraries >%def_disable v8_internal >%def_disable libchromiumcontent >%def_enable vaapi >%def_enable widevine > >%define v8_version 4.8.271.19 > >%if_enabled debug >%define buildtype Debug >%else >%define buildtype Release >%endif > >Name: chromium >Version: 48.0.2564.109 >Release: alt1.1 > >Summary: An open source web browser developed by Google >License: BSD-3-Clause and LGPL-2.1+ >Group: Networking/WWW >Url: http://code.google.com/p/chromium/ > >Source0: %name-%version.tar.gz >Source10: depot_tools.tar >Source11: libchromiumcontent.tar > >Source30: master_preferences >Source31: default_bookmarks.html >Source99: chrome-wrapper >Source100: %name.sh >Source101: chromium.desktop >Source102: chromium.xml >Source200: %name.default > >Provides: chromium-browser = %version >Obsoletes: chromium-browser < %version > >## Start Patches ># Patches from SUSE ># PATCH-FIX-OPENSUSE enables reading of the master preference >Patch14: chromium-master-prefs-path.patch ># PATCH-FIX-OPENSUSE Fix some includes specifically for the GCC version used >Patch20: chromium-gcc-fixes.patch ># PATCH-FIX-OPENSUSE patches in the system v8 library >Patch63: chromium-system-v8.patch ># PATCH-FIX-UPSTREAM Add more charset aliases >Patch64: chromium-more-codec-aliases.patch ># PATCH-FIX-OPENSUSE Compile the sandbox with -fPIE settings >Patch66: chromium-sandbox-pie.patch > ># TODO Obsoleted patches from SUSE ># PATCH-FIX-OPENSUSE patches in system zlib library >Patch8: chromium-codechanges-zlib.patch ># PATCH-FIX-OPENSUSE patches in system glew library >Patch17: chromium-system-glew.patch ># PATCH-FIX-OPENSUSE patches in the system libvpx library >Patch32: chromium-system-libvpx.patch > ># Patches from other vendors ># ALT: Fix krb5 includes path >Patch69: chromium-alt-krb5-fix-path.patch ># Set appropriate desktop file name for default browser check >Patch71: chromium-set-desktop-file-name.patch > ># Patches from Debian >Patch85: chromium-fix-manpage.patch >Patch86: chromium-icon.patch ># Old, but specific >Patch87: chromium-cups1.5.patch >Patch90: chromium-gcc4.7.patch >Patch91: chromium-arm.patch ># New from Debian >Patch92: chromium-third-party-cookies-off-by-default.patch >Patch93: chromium-ps-print.patch > ># Patches from ALT Linux >Patch95: chromium-fix-shrank-by-one-character.patch >Patch96: chromium-set-ffmpeg-flags-for-multimedia.patch >Patch98: chromium-fix-ffmpeg-build-on-ia32.patch > ># Experimental patches ># https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1424201 >Patch300: chromium-enable_vaapi_on_linux.patch ># If exterior-sourced widevine library exists at run-time, use it. >Patch301: chromium-fix_building_widevinecdm_with_chromium.patch > >BuildRequires: /proc > >BuildRequires: bison >BuildRequires: bzlib-devel >BuildRequires: flex >%if_enabled clang >BuildRequires: clang >BuildRequires: gcc-c++ >%else ># There is too many errors while build by gcc 5.x. See https://code.google.com/p/chromium/issues/detail?id=466760 >BuildRequires: gcc4.9-c++ >%endif >BuildRequires: gperf >BuildRequires: gst-plugins-devel >BuildRequires: jsoncpp-devel >BuildRequires: libalsa-devel >BuildRequires: libavcodec-devel >BuildRequires: libavformat-devel >BuildRequires: libavutil-devel >BuildRequires: libcap-devel >BuildRequires: libcups-devel >BuildRequires: libdbus-glib-devel >BuildRequires: libelf-devel >BuildRequires: libexif-devel >BuildRequires: libevent1.4-devel >BuildRequires: libexpat-devel >BuildRequires: libflac-devel >BuildRequires: libglew-devel >BuildRequires: libgcrypt-devel >BuildRequires: libgnome-keyring-devel >BuildRequires: libhunspell-devel >BuildRequires: libharfbuzz-devel >#BuildRequires: libicu-devel >= 4.0 >BuildRequires: libjpeg-devel >BuildRequires: libkrb5-devel >BuildRequires: libnspr-devel >BuildRequires: libnss-devel >BuildRequires: libopus-devel >BuildRequires: libpam-devel >BuildRequires: libpci-devel >BuildRequires: libpng12-devel >BuildRequires: libpulseaudio-devel >BuildRequires: libspeechd-devel >= 0.8 >BuildRequires: libsqlite3-devel >BuildRequires: libssl-devel >BuildRequires: libudev-devel >%if_disabled v8_internal >BuildRequires: libv8-chromium-devel = %v8_version >Requires: libv8-chromium = %v8_version >%endif >BuildRequires: libvpx-devel >BuildRequires: libwebp-devel >BuildRequires: libx264-devel >BuildRequires: libxslt-devel >BuildRequires: libXdamage-devel >BuildRequires: libXrandr-devel >BuildRequires: libXtst-devel >BuildRequires: libyasm-devel >BuildRequires: perl-Switch >BuildRequires: ninja-build >BuildRequires: pkg-config >BuildRequires: pkgconfig(cairo) >= 1.6 >BuildRequires: pkgconfig(dbus-1) >BuildRequires: pkgconfig(gconf-2.0) >BuildRequires: pkgconfig(glib-2.0) >BuildRequires: pkgconfig(gtk+-2.0) >BuildRequires: pkgconfig(libxml-2.0) >BuildRequires: pkgconfig(x11) >BuildRequires: pkgconfig(xcomposite) >BuildRequires: pkgconfig(xcursor) >BuildRequires: pkgconfig(xext) >BuildRequires: pkgconfig(xfixes) >BuildRequires: pkgconfig(xi) >BuildRequires: pkgconfig(xrender) >BuildRequires: pkgconfig(xscrnsaver) >BuildRequires: pkgconfig(xt) >BuildRequires: python-devel >BuildRequires: python-module-PyXML >BuildRequires: python-modules-compiler >BuildRequires: python-modules-email >BuildRequires: python-modules-encodings >BuildRequires: python-modules-json >BuildRequires: python-modules-logging >BuildRequires: subversion >BuildRequires: wdiff >BuildRequires: yasm >BuildRequires: usbids >BuildRequires: xdg-utils >BuildRequires: zlib-devel >%if_enabled vaapi >BuildRequires: libva-devel >%endif > >Provides: webclient, /usr/bin/xbrowser >BuildPreReq: alternatives >= 0.2.0 >PreReq(post,preun): alternatives >= 0.2 > >Requires: libalsa libGConf libgtk+2 libjpeg libpci libpulseaudio libXScrnSaver libxslt libXtst > >%description >Chromium is an open-source browser project that aims to build a safer, >faster, and more stable way for all Internet users to experience the web. > >%package kde > >Summary: Update to chromium to use KDE's kwallet to store passwords >License: BSD-3-Clause and LGPL-2.1+ >Group: Networking/WWW >Conflicts: chromium-gnome >Conflicts: chromium-desktop-gnome >Provides: chromium-password = %version >Provides: chromium-desktop-kde = %version >Obsoletes: chromium-desktop-kde < %version >Requires: chromium = %version >Requires: kde4base-runtime-core > >%description kde >By using the update-alternatives the password store for Chromium is >changed to utilize KDE's kwallet. Please be aware that by this change >the old password are no longer accessible and are also not converted >to kwallet. > >%package gnome > >Summary: Update to chromium to use Gnome keyring to store passwords >License: BSD-3-Clause and LGPL-2.1+ >Group: Networking/WWW >Conflicts: chromium-desktop-kde >Conflicts: chromium-kde >Provides: chromium-password = %version >Provides: chromium-desktop-gnome = %version >Obsoletes: chromium-desktop-gnome < %version >Requires: chromium = %version >Requires: gnome-keyring > >%description gnome >By using the update-alternatives the password store for Chromium is >changed to utilize Gnome's Keyring. Please be aware that by this change >the old password are no longer accessible and are also not converted >to Gnome's Keyring. > >%prep >%setup -q -n %name >tar xf %SOURCE10 -C src >tar xf %SOURCE11 -C src >cp -a src/libchromiumcontent/chromiumcontent src > >%patch8 -p2 >%patch14 -p2 >%patch17 -p1 >%patch20 -p0 -d src >%if_disabled v8_internal >%patch63 -p1 -d src >%endif >%patch64 -p0 -d src >%patch66 -p1 >%patch69 -p2 >%patch71 -p2 > >%patch85 -p1 >%patch86 -p0 >%patch87 -p1 >%patch90 -p1 >%patch91 -p1 >%patch92 -p0 >%patch93 -p1 >%patch95 -p0 >%patch96 -p0 >#patch98 -p0 > ># VAAPI >%if_enabled vaapi >%patch300 -p1 -d src >%endif >%if_enabled widevine >%patch301 -p1 -d src >%endif > >%if_disabled v8_internal ># Replace anywhere v8 to system package >subst 's,v8/tools/gyp/v8.gyp,build/linux/system.gyp,' `find . -type f -a -name *.gyp*` >subst 's,v8_libplatform,v8,' src/third_party/pdfium/samples/samples.gyp >sed -i '/v8_shell#host/d' src/chrome/chrome_tests.gypi src/chrome/js_unittest_rules.gypi >grep -Rl '^#include [<"]v8/include' * 2>/dev/null | while read f;do subst 's,^\(#include [<"]\)v8/include/,\1,' "$f";done >%endif > ># Move vpx/internal/vpx_codec_internal.h to one directory up >grep -Rl 'vpx/internal/vpx_codec_internal.h' src/third_party/libvpx | xargs subst 's,vpx/internal/vpx_codec_internal.h,vpx/vpx_codec_internal.h,' >mv -f src/third_party/libvpx/source/libvpx/vpx/{internal/,}vpx_codec_internal.h > ># Make sure that the requires legal files can be found >cp -a src/AUTHORS src/LICENSE . > >cd src > ># Set fake version for some components >#sed '11i#define WIDEVINE_CDM_VERSION_STRING "The Cake Is a Lie"' -i third_party/widevine/cdm/stub/widevine_cdm_version.h >echo > "third_party/adobe/flash/flapper_version.h" > ># Rebuild configuration of bundled ffmpeg >pushd third_party/ffmpeg >ffmpeg_target_arch=ia32 >build_ffmpeg_args=" --disable-asm" > >%ifarch x86_64 >ffmpeg_target_arch=x64 >%endif >%ifarch arm armh >ffmpeg_target_arch=arm >%endif > >chromium/scripts/build_ffmpeg.py \ > linux-noasm \ > ${ffmpeg_target_arch} \ > --branding Chrome \ > --config-only \ > -- ${build_ffmpeg_args} >chromium/scripts/copy_config.sh >#chromium/scripts/generate_gyp.py >popd > >%build >## create make files > >PARSED_OPT_FLAGS=`echo \'%optflags -DUSE_SYSTEM_LIBEVENT -fPIC -fno-ipa-cp -fno-strict-aliasing \' | sed "s/ /',/g" | sed "s/',/', '/g"` >for i in src/build/common.gypi; do > sed -i "s|'-march=pentium4',||g" $i >%ifnarch x86_64 > sed -i "s|'-mfpmath=sse',||g" $i >%endif > sed -i "s|'-O<(debug_optimize)',||g" $i > sed -i "s|'-m32',||g" $i > sed -i "s|'-fno-exceptions',|$PARSED_OPT_FLAGS|g" $i > sed -i "s|'-Werror'|'-Wno-error'|g" $i >done > ># Set up Google API keys, see http://www.chromium.org/developers/how-tos/api-keys . ># Note: these are for ALT Linux use ONLY. For your own distribution, ># please get your own set of keys. >_google_api_key='AIzaSyAIIWz7zaCwYcUSe3ZaRPviXjMjkBP4-xY' >_google_default_client_id='1018394967181.apps.googleusercontent.com' >_google_default_client_secret='h_PrTP1ymJu83YTLyz-E25nP' > >cd src >./build/gyp_chromium -f ninja build/all.gyp \ >%if_enabled shared_libraries > -Dcomponent=shared_library \ >%endif > -Dbuild_ffmpegsumo=1 \ >%if_disabled nacl > -Ddisable_nacl=1 \ > -Ddisable_pnacl=1 \ >%endif > -Ddisable_sse2=1 \ > -Denable_plugin_installation=0 \ > -Ddisable_newlib_untar=1 \ >%if_enabled clang > -Dclang=1 \ >%else > -Dclang=0 \ >%endif > -Dgoogle_api_key="$_google_api_key" \ > -Dgoogle_default_client_id="$_google_default_client_id" \ > -Dgoogle_default_client_secret="$_google_default_client_secret" \ > -Dffmpeg_branding=Chrome \ > -Djavascript_engine=v8 \ > -Dlinux_fpic=1 \ > -Dlinux_dump_symbols=1 \ > -Dlinux_link_gsettings=1 \ > -Dlinux_link_libpci=1 \ > -Dlinux_link_libspeechd=1 \ > -Dlibspeechd_h_prefix=speech-dispatcher/ \ > -Dlinux_link_pulseaudio=1 \ > -Dlinux_strip_binary=1 \ > -Dlinux_sandbox_chrome_path=%_libdir/chromium/chromium \ > -Dlinux_sandbox_path=%_libdir/chromium/chrome-sandbox \ > -Dclang_use_chrome_plugins=0 \ > -Dhost_clang=0 \ > -Dlinux_use_bundled_binutils=0 \ > -Dlinux_use_bundled_gold=0 \ > -Dlinux_use_gold_flags=0 \ > -Dlogging_like_official_build=1 \ > -Dproprietary_codecs=1 \ > -Dremove_webcore_debug_symbols=1 \ > -Dusb_ids_path=/usr/share/misc/usb.ids \ > -Dwerror= \ > -Ddisable_fatal_linker_warnings=1 \ >%ifarch x86_64 > -Dtarget_arch=x64 \ >%endif >%ifarch arm armh > -Dtarget_arch=arm \ > -Denable_webrtc=0 \ > -Denable_widevine=0 \ > -Duse_cups=1 \ >%ifarch arm > -Dv8_use_arm_eabi_hardfloat=false \ > -Darm_float_abi=soft \ > -Darm_thumb=0 \ > -Darmv7=0 \ > -Darm_neon=0 \ >%endif >%ifarch armh > -Dv8_use_arm_eabi_hardfloat=true \ > -Darm_fpu=vfpv3 \ > -Darm_float_abi=hard \ > -Darm_thumb=1 \ > -Darmv7=1 \ > -Darm_neon=0 \ >%endif >%endif >%ifnarch arm armh > -Denable_webrtc=1 \ >%if_enabled widevine > -Denable_widevine=1 \ >%else > -Denable_widevine=0 \ >%endif >%endif > -Duse_pulseaudio=1 \ > -Duse_system_bzip2=1 \ > -Duse_system_ffmpeg=0 \ > -Duse_system_flac=1 \ > -Duse_system_harfbuzz=1 \ > -Duse_system_icu=0 \ > -Duse_system_jsoncpp=1 \ > -Duse_system_libbz2=1 \ > -Duse_system_libevent=1 \ > -Duse_system_libexif=1 \ > -Duse_system_libjpeg=1 \ > -Duse_system_libmtp=0 \ > -Duse_system_libopus=1 \ > -Duse_system_libpng=1 \ > -Duse_system_libusb=0 \ > -Duse_system_libvpx=0 \ > -Duse_system_libwebp=1 \ > -Duse_system_libxml=1 \ > -Duse_system_libxnvctrl=0 \ > -Duse_system_libxslt=1 \ > -Duse_system_libyuv=1 \ > -Duse_system_minizip=1 \ > -Duse_system_nspr=0 \ > -Duse_system_protobuf=0 \ > -Duse_system_re2=1 \ > -Duse_system_snappy=1 \ > -Duse_system_sqlite=0 \ > -Duse_system_ssl=0 \ > -Duse_system_v8=1 \ > -Duse_system_xdg_utils=1 \ > -Duse_system_yasm=1 \ > -Duse_system_zlib=1 \ > -Dwant_separate_host_toolset=0 \ > -Dmac_mas_build=0 \ >%if_enabled libchromiumcontent > -Ichromiumcontent/chromiumcontent.gypi \ >%endif > %nil ># Unused flags ># -Dlinux_use_tcmalloc=0 \ > ># Limit number of threads >export NPROCS=4 > ># Build with ninja-build (see https://code.google.com/p/chromium/wiki/LinuxBuildInstructions) >ninja-build -C out/Release \ >%if_enabled verbose > -v \ >%endif > -j $NPROCS \ > chrome \ > chrome_sandbox \ > chromedriver \ > clearkeycdm \ > widevinecdmadapter ># Obsoleted or failed to build target ># pdf > >%install >mkdir -p %buildroot%_libdir/chromium/ >%ifarch x86_64 >mkdir -p %buildroot%_prefix/lib/ >%endif >install -m 755 %SOURCE100 %buildroot%_libdir/chromium/chromium-generic >install -pD -m644 %SOURCE200 %buildroot%_sysconfdir/%name/default ># x86_64 capable systems need this >sed -i "s|/usr/lib/chromium|%_libdir/chromium|g" %buildroot%_libdir/chromium/chromium-generic > >#update the password-store settings for each alternative >sed "s|password-store=detect|password-store=kwallet|g" %buildroot%_libdir/chromium/chromium-generic > %buildroot%_libdir/chromium/chromium-kde >sed "s|password-store=detect|password-store=gnome|g" %buildroot%_libdir/chromium/chromium-generic > %buildroot%_libdir/chromium/chromium-gnome >mkdir -p %buildroot%_mandir/man1/ > >pushd src/out/%buildtype > ># Strip Chromium executables to disable debuginfo generation (became too huge) >strip chrome chrome_sandbox chromedriver > >cp -a chrome %buildroot%_libdir/chromium/chromium >cp -a chrome_sandbox %buildroot%_libdir/chromium/chrome-sandbox >cp -a *.pak locales %buildroot%_libdir/chromium/ >cp -a chromedriver %buildroot%_libdir/chromium/ >cp -a icudtl.dat %buildroot%_libdir/chromium/ > >cp -a chrome.1 %buildroot%_mandir/man1/chrome.1 >cp -a chrome.1 %buildroot%_mandir/man1/chromium.1 > ># Copy plugin libraries >cp -av lib*.so %buildroot%_libdir/chromium/ > >%if_enabled shared_libraries >mkdir -p %buildroot%_libdir/chromium/lib >pushd lib >cp -av *.so %buildroot%_libdir/chromium/lib >popd >%endif > ># NaCl >%if_enabled nacl >cp -a nacl_helper %buildroot%_libdir/chromium/ >cp -a nacl_helper_bootstrap %buildroot%_libdir/chromium/ >cp -a nacl_irt_*.nexe %buildroot%_libdir/chromium/ >cp -a libppGoogleNaClPluginChrome.so %buildroot%_libdir/chromium/ >%endif >popd > ># Icons >for size in 22 24 48 64 128 256; do > install -Dm644 "src/chrome/app/theme/chromium/product_logo_$size.png" \ > "%buildroot%_iconsdir/hicolor/${size}x${size}/apps/%{name}.png" >done >for size in 16 32; do > install -Dm644 "src/chrome/app/theme/default_100_percent/chromium/product_logo_$size.png" \ > "%buildroot%_iconsdir/hicolor/${size}x${size}/apps/%{name}.png" >done > ># Desktop file >install -Dm0644 %SOURCE101 %buildroot%_desktopdir/%{name}.desktop > >mkdir -p %buildroot%_datadir/gnome-control-center/default-apps/ >cp -a %SOURCE102 %buildroot%_datadir/gnome-control-center/default-apps/ > ># link to browser plugin path. Plugin patch doesn't work. Why? >mkdir -p %buildroot%_libdir/browser-plugins >pushd %buildroot%_libdir/%name >ln -s %_libdir/browser-plugins plugins > ># Install the master_preferences file >mkdir -p %buildroot%_sysconfdir/%name >install -m 0644 %SOURCE30 %buildroot%_sysconfdir/%name >install -m 0644 %SOURCE31 %buildroot%_sysconfdir/%name > ># Set alternative to xbrowser >mkdir -p %buildroot%_altdir >printf '%_bindir/xbrowser\t%_bindir/%name\t50\n' > %buildroot%_altdir/%name >printf '%_bindir/%name\t%_libdir/%name/%name-generic\t10\n' > %buildroot%_altdir/%name-generic >printf '%_bindir/%name\t%_libdir/%name/%name-kde\t15\n' > %buildroot%_altdir/%name-kde >printf '%_bindir/%name\t%_libdir/%name/%name-gnome\t15\n' > %buildroot%_altdir/%name-gnome > >strip \ >%if_enabled shared_libraries > %buildroot/%_libdir/chromium/lib/lib*.so \ >%endif > %buildroot/%_libdir/chromium/lib*.so > ># Package link to external startup data from v8 >ln -s %_libdir/v8/natives_blob.bin %buildroot%_libdir/chromium/natives_blob.bin >ln -s %_libdir/v8/snapshot_blob.bin %buildroot%_libdir/chromium/snapshot_blob.bin > >%files >%doc AUTHORS LICENSE >%dir %_datadir/gnome-control-center >%dir %_datadir/gnome-control-center/default-apps >%config %_sysconfdir/%name/* >%dir %_libdir/chromium/ >%attr(4711,root,root) %_libdir/chromium/chrome-sandbox >%_libdir/chromium/chromium >%_libdir/chromium/chromedriver >%_libdir/chromium/chromium-generic >%_libdir/chromium/lib*.so >%if_enabled shared_libraries >%_libdir/chromium/lib/ >%endif >%_libdir/chromium/icudtl.dat >%_libdir/chromium/plugins/ >%_libdir/chromium/locales/ >%if_enabled nacl >%_libdir/chromium/nacl_* >%_libdir/chromium/libppGoogleNaClPluginChrome.so >%endif >%_libdir/chromium/*.pak >%_man1dir/chrom* >%_desktopdir/%name.desktop >%_datadir/gnome-control-center/default-apps/chromium.xml >%_iconsdir/hicolor/*/apps/chromium.* >%_altdir/%name >%_altdir/%name-generic >%_libdir/chromium/*.bin > >%files kde >%attr(755, root, root) %_libdir/chromium/chromium-kde >%_altdir/%name-kde > >%files gnome >%attr(755, root, root) %_libdir/chromium/chromium-gnome >%_altdir/%name-gnome > >%changelog >* Mon Feb 15 2016 L.A. Kostis <lakostis@altlinux.ru> 48.0.2564.109-alt1.1 >- Enabled WebRTC support on non-ARM platforms. >- Restored build of widevine (support of DRM-protected content playback). >- Added patches from Debian: > + fix_building_widevinecdm_with_chromium.patch: If exterior-sourced > widevine library exists at run-time, use it. > >* Wed Feb 10 2016 Andrey Cherepanov <cas@altlinux.org> 48.0.2564.109-alt1 >- New version >- Security fixes: > - High CVE-2016-1622: Same-origin bypass in Extensions. > - High CVE-2016-1623: Same-origin bypass in DOM. > - High CVE-2016-1624: Buffer overflow in Brotli. > - Medium CVE-2016-1625: Navigation bypass in Chrome Instant. > - Medium CVE-2016-1626: Out-of-bounds read in PDFium. > >* Tue Feb 09 2016 Andrey Cherepanov <cas@altlinux.org> 48.0.2564.103-alt2 >- Enable experimental VAAPI support (ALT #31772) (thanks L.A. Kostis > for patch) > >* Thu Feb 04 2016 Andrey Cherepanov <cas@altlinux.org> 48.0.2564.103-alt1 >- New version > >* Thu Jan 28 2016 Andrey Cherepanov <cas@altlinux.org> 48.0.2564.97-alt1 >- New version > >* Thu Jan 28 2016 Andrey Cherepanov <cas@altlinux.org> 48.0.2564.82-alt1 >- New version >- Security fixes: > - High CVE-2016-1613: Use-after-free in PDFium. > - Medium CVE-2016-1614: Information leak in Blink. > - Medium CVE-2016-1615: Origin confusion in Omnibox. > - Medium CVE-2016-1616: URL Spoofing. > - Medium CVE-2016-1617: History sniffing with HSTS and CSP. > - Medium CVE-2016-1618: Weak random number generator in Blink. > - Medium CVE-2016-1619: Out-of-bounds read in PDFium. > >* Thu Jan 14 2016 Andrey Cherepanov <cas@altlinux.org> 47.0.2526.111-alt1 >- New version > >* Wed Dec 16 2015 Andrey Cherepanov <cas@altlinux.org> 47.0.2526.106-alt1 >- New version >- Security fix CVE-2015-6792: Fixes from internal audits and fuzzing >- Add missing requirements skipping by autoreq (ALT #31397) > >* Wed Dec 09 2015 Andrey Cherepanov <cas@altlinux.org> 47.0.2526.80-alt1 >- New version >- Security fixes: > - High CVE-2015-6788: Type confusion in extensions. > - High CVE-2015-6789: Use-after-free in Blink. > - Medium CVE-2015-6790: Escaping issue in saved pages. > >* Wed Dec 02 2015 Andrey Cherepanov <cas@altlinux.org> 47.0.2526.73-alt1 >- New version >- Security fixes: > - Critical CVE-2015-6765: Use-after-free in AppCache. > - High CVE-2015-6766: Use-after-free in AppCache. > - High CVE-2015-6767: Use-after-free in AppCache. > - High CVE-2015-6768: Cross-origin bypass in DOM. > - High CVE-2015-6769: Cross-origin bypass in core. > - High CVE-2015-6770: Cross-origin bypass in DOM. > - High CVE-2015-6771: Out of bounds access in v8. > - High CVE-2015-6772: Cross-origin bypass in DOM. > - High CVE-2015-6764: Out of bounds access in v8. > - High CVE-2015-6773: Out of bounds access in Skia. > - High CVE-2015-6774: Use-after-free in Extensions. > - High CVE-2015-6775: Type confusion in PDFium. > - High CVE-2015-6776: Out of bounds access in PDFium. > - High CVE-2015-6777: Use-after-free in DOM. > - Medium CVE-2015-6778: Out of bounds access in PDFium. > - Medium CVE-2015-6779: Scheme bypass in PDFium. > - Medium CVE-2015-6780: Use-after-free in Infobars. > - Medium CVE-2015-6781: Integer overflow in Sfntly. > - Medium CVE-2015-6782: Content spoofing in Omnibox. > - Low CVE-2015-6784: Escaping issue in saved pages. > - Low CVE-2015-6785: Wildcard matching issue in CSP. > - Low CVE-2015-6786: Scheme bypass in CSP. >- Include libchromiumcontent (build disabled by default) > >* Wed Nov 11 2015 Andrey Cherepanov <cas@altlinux.org> 46.0.2490.86-alt1 >- New version >- Security fixes: > - High CVE-2015-1302: Information leak in PDF viewer. > >* Mon Nov 02 2015 Andrey Cherepanov <cas@altlinux.org> 46.0.2490.80-alt1 >- New version > >* Wed Oct 14 2015 Andrey Cherepanov <cas@altlinux.org> 46.0.2490.71-alt1 >- New version >- Security fixes: > - High CVE-2015-6755: Cross-origin bypass in Blink. > - High CVE-2015-6756: Use-after-free in PDFium. > - High CVE-2015-6757: Use-after-free in ServiceWorker. > - High CVE-2015-6758: Bad-cast in PDFium. > - Medium CVE-2015-6759: Information leakage in LocalStorage. > - Medium CVE-2015-6760: Improper error handling in libANGLE. > - Medium CVE-2015-6761: Memory corruption in FFMpeg. > - Low CVE-2015-6762: CORS bypass via CSS fonts. > >* Mon Sep 28 2015 Andrey Cherepanov <cas@altlinux.org> 45.0.2454.101-alt1 >- New version >- Security fixes: > - High CVE-2015-1303: Cross-origin bypass in DOM. > - High CVE-2015-1304: Cross-origin bypass in V8. > >* Wed Sep 23 2015 Andrey Cherepanov <cas@altlinux.org> 45.0.2454.99-alt1 >- New version >- Strip binaries before install > >* Mon Sep 21 2015 Andrey Cherepanov <cas@altlinux.org> 45.0.2454.93-alt1 >- New version > >* Wed Sep 02 2015 Andrey Cherepanov <cas@altlinux.org> 45.0.2454.85-alt1 >- New version >- Security fixes: > - High CVE-2015-1291: Cross-origin bypass in DOM. > - High CVE-2015-1292: Cross-origin bypass in ServiceWorker. > - High CVE-2015-1293: Cross-origin bypass in DOM. > - High CVE-2015-1294: Use-after-free in Skia. > - High CVE-2015-1295: Use-after-free in Printing. > - High CVE-2015-1296: Character spoofing in omnibox. > - Medium CVE-2015-1297: Permission scoping error in WebRequest. > - Medium CVE-2015-1298: URL validation error in extensions. > - Medium CVE-2015-1299: Use-after-free in Blink. > - Medium CVE-2015-1300: Information leak in Blink. > >* Wed Aug 26 2015 Andrey Cherepanov <cas@altlinux.org> 44.0.2403.157-alt1 >- New version > >* Wed Jul 15 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.134-alt1 >- New version >- Critical update to Adobe Flash Player (18.0.0.209) and a fix for a > full screen casting issue > >* Wed Jul 08 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.132-alt1 >- New version > >* Mon Jun 29 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.130-alt1 >- New version >- Security fixes: > - High CVE-2015-1266: Scheme validation error in WebUI. > - High CVE-2015-1268: Cross-origin bypass in Blink. > - Medium CVE-2015-1267: Cross-origin bypass in Blink. > - Medium CVE-2015-1269: Normalization error in HSTS/HPKP preload list. >- use more external shared libraries (especially libv8) > >* Mon Jun 15 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.125-alt1 >- New version >- Fixes: > - Resolved browser font magnification/scaling issue >- Cannot package missing libpdf.so >- Add clearkeycdm component >- Disable build on i586 (because memory exhausted while linking) >- Disable automatic external extensions loading (see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786909) > Also you can use --show-component-extension-options command line parameter > to view all hidden extensions > >* Thu Jun 04 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.81-alt1 >- New version >- Fixes: > - [490611] Fixed an issue where sometimes a blank page would print. > - [478714] Icons not displaying properly on Linux. > >* Wed May 20 2015 Andrey Cherepanov <cas@altlinux.org> 43.0.2357.65-alt1 >- New version >- Security fixes: > - High CVE-2015-1252: Sandbox escape in Chrome. > - High CVE-2015-1253: Cross-origin bypass in DOM. > - High CVE-2015-1254: Cross-origin bypass in Editing. > - High CVE-2015-1255: Use-after-free in WebAudio. > - High CVE-2015-1256: Use-after-free in SVG. > - High CVE-2015-1251: Use-after-free in Speech. > - Medium CVE-2015-1257: Container-overflow in SVG. > - Medium CVE-2015-1258: Negative-size parameter in Libvpx. > - Medium CVE-2015-1259: Uninitialized value in PDFium. > - Medium CVE-2015-1260: Use-after-free in WebRTC. > - Medium CVE-2015-1261: URL bar spoofing. > - Medium CVE-2015-1262: Uninitialized value in Blink. > - Low CVE-2015-1263: Insecure download of spellcheck dictionary. > - Low CVE-2015-1264: Cross-site scripting in bookmarks. > >* Tue May 19 2015 Andrey Cherepanov <cas@altlinux.org> 42.0.2311.152-alt1 >- New version > >* Wed Apr 29 2015 Andrey Cherepanov <cas@altlinux.org> 42.0.2311.135-alt1 >- New version >- Security fixes: > - High CVE-2015-1243: Use-after-free in DOM. > >* Wed Apr 15 2015 Andrey Cherepanov <cas@altlinux.org> 42.0.2311.90-alt1 >- New version >- Security fixes: > - High CVE-2015-1235: Cross-origin-bypass in HTML parser. > - Medium CVE-2015-1236: Cross-origin-bypass in Blink. > - High CVE-2015-1237: Use-after-free in IPC. > - High CVE-2015-1238: Out-of-bounds write in Skia. > - Medium CVE-2015-1240: Out-of-bounds read in WebGL. > - Medium CVE-2015-1241: Tap-Jacking. > - High CVE-2015-1242: Type confusion in V8. > - Medium CVE-2015-1244: HSTS bypass in WebSockets. > - Medium CVE-2015-1245: Use-after-free in PDFium. > - Medium CVE-2015-1246: Out-of-bounds read in Blink. > - Medium CVE-2015-1247: Scheme issues in OpenSearch. > - Medium CVE-2015-1248: SafeBrowsing bypass. > > >* Thu Apr 02 2015 Andrey Cherepanov <cas@altlinux.org> 41.0.2272.118-alt1 >- New version >- Security fixes: > - Critical CVE-2015-1233: A special thanks to Anonymous for a > combination of V8, Gamepad and IPC bugs that can lead to remote > code execution outside of the sandbox. > - High CVE-2015-1234: Buffer overflow via race condition in GPU. > >* Fri Mar 20 2015 Andrey Cherepanov <cas@altlinux.org> 41.0.2272.101-alt1 >- New version >- Package all *.bin files > >* Tue Mar 17 2015 Andrey Cherepanov <cas@altlinux.org> 41.0.2272.89-alt1 >- New version > >* Wed Mar 04 2015 Andrey Cherepanov <cas@altlinux.org> 41.0.2272.76-alt1 >- New version >- Security fixes: > - High CVE-2015-1212: Out-of-bounds write in media. > - High CVE-2015-1213: Out-of-bounds write in skia filters. > - High CVE-2015-1214: Out-of-bounds write in skia filters. > - High CVE-2015-1215: Out-of-bounds write in skia filters. > - High CVE-2015-1216: Use-after-free in v8 bindings. > - High CVE-2015-1217: Type confusion in v8 bindings. > - High CVE-2015-1218: Use-after-free in dom. > - High CVE-2015-1219: Integer overflow in webgl. > - High CVE-2015-1220: Use-after-free in gif decoder. > - High CVE-2015-1221: Use-after-free in web databases. > - High CVE-2015-1222: Use-after-free in service workers. > - High CVE-2015-1223: Use-after-free in dom. > - High CVE-2015-1230: Type confusion in v8. > - Medium CVE-2015-1224: Out-of-bounds read in vpxdecoder. > - Medium CVE-2015-1225: Out-of-bounds read in pdfium. > - Medium CVE-2015-1226: Validation issue in debugger. > - Medium CVE-2015-1227: Uninitialized value in blink. > - Medium CVE-2015-1228: Uninitialized value in rendering. > - Medium CVE-2015-1229: Cookie injection via proxies. > >* Fri Feb 20 2015 Andrey Cherepanov <cas@altlinux.org> 40.0.2214.115-alt1 >- New version > >* Fri Feb 06 2015 Andrey Cherepanov <cas@altlinux.org> 40.0.2214.111-alt1 >- New version >- Security fixes: > - High CVE-2015-1211: Privilege escalation using service workers. > >* Tue Jan 27 2015 Andrey Cherepanov <cas@altlinux.org> 40.0.2214.93-alt1 >- New version > >* Fri Jan 23 2015 Andrey Cherepanov <cas@altlinux.org> 40.0.2214.91-alt1 >- New version >- Security fixes: > - High CVE-2014-7923: Memory corruption in ICU. > - High CVE-2014-7924: Use-after-free in IndexedDB. > - High CVE-2014-7925: Use-after-free in WebAudio. > - High CVE-2014-7926: Memory corruption in ICU. > - High CVE-2014-7927: Memory corruption in V8. > - High CVE-2014-7928: Memory corruption in V8. > - High CVE-2014-7930: Use-after-free in DOM. > - High CVE-2014-7931: Memory corruption in V8. > - High CVE-2014-7929: Use-after-free in DOM. > - High CVE-2014-7932: Use-after-free in DOM. > - High CVE-2014-7933: Use-after-free in FFmpeg. > - High CVE-2014-7934: Use-after-free in DOM. > - High CVE-2014-7935: Use-after-free in Speech. > - High CVE-2014-7936: Use-after-free in Views. > - High CVE-2014-7937: Use-after-free in FFmpeg. > - High CVE-2014-7938: Memory corruption in Fonts. > - High CVE-2014-7939: Same-origin-bypass in V8. > - Medium CVE-2014-7940: Uninitialized-value in ICU. > - Medium CVE-2014-7941: Out-of-bounds read in UI. > - Medium CVE-2014-7942: Uninitialized-value in Fonts. > - Medium CVE-2014-7943: Out-of-bounds read in Skia. > - Medium CVE-2014-7944: Out-of-bounds read in PDFium. > - Medium CVE-2014-7945: Out-of-bounds read in PDFium. > - Medium CVE-2014-7946: Out-of-bounds read in Fonts. > - Medium CVE-2014-7947: Out-of-bounds read in PDFium. > - Medium CVE-2014-7948: Caching error in AppCache. > >* Wed Jan 14 2015 Andrey Cherepanov <cas@altlinux.org> 39.0.2171.99-alt1 >- New version > >* Wed Dec 10 2014 Andrey Cherepanov <cas@altlinux.org> 39.0.2171.95-alt1 >- New version > >* Tue Dec 09 2014 Andrey Cherepanov <cas@altlinux.org> 39.0.2171.71-alt1 >- New version > >* Fri Nov 21 2014 Andrey Cherepanov <cas@altlinux.org> 39.0.2171.65-alt1 >- New version >- Security fixes: > - High CVE-2014-7899: Address bar spoofing. > - High CVE-2014-7900: Use-after-free in pdfium. > - High CVE-2014-7901: Integer overflow in pdfium. > - High CVE-2014-7902: Use-after-free in pdfium. > - High CVE-2014-7903: Buffer overflow in pdfium. > - High CVE-2014-7904: Buffer overflow in Skia. > - High CVE-2014-7905: Flaw allowing navigation to intents that do not > have the BROWSABLE category. > - High CVE-2014-7906: Use-after-free in pepper plugins. > - High CVE-2014-0574: Double-free in Flash. > - High CVE-2014-7907: Use-after-free in blink. > - High CVE-2014-7908: Integer overflow in media. > - Medium CVE-2014-7909: Uninitialized memory read in Skia. >- Mark all files in /etc/chromium as config >- Strip Chromium executables to disable debuginfo generation (became too > huge) > >* Wed Nov 12 2014 Andrey Cherepanov <cas@altlinux.org> 38.0.2125.122-alt1 >- New version > >* Thu Nov 06 2014 Andrey Cherepanov <cas@altlinux.org> 38.0.2125.111-alt1 >- New version >- Use sed insted of strings utility from binutils for detect PepperFlash > plugin version >- Remove second tab in master preferences >- Replace default config > >* Thu Oct 09 2014 Andrey Cherepanov <cas@altlinux.org> 38.0.2125.101-alt1 >- New version >- Security fixes: > - Critical CVE-2014-3188: A special thanks to Juri Aedla for a > combination of V8 and IPC bugs that can lead to remote code > execution outside of the sandbox. > - High CVE-2014-3189: Out-of-bounds read in PDFium. > - High CVE-2014-3190: Use-after-free in Events. > - High CVE-2014-3191: Use-after-free in Rendering. > - High CVE-2014-3192: Use-after-free in DOM. > - High CVE-2014-3193: Type confusion in Session Management. > - High CVE-2014-3194: Use-after-free in Web Workers. > - Medium CVE-2014-3195: Information Leak in V8. > - Medium CVE-2014-3197: Information Leak in XSS Auditor. > - Medium CVE-2014-3198: Out-of-bounds read in PDFium. > - Low CVE-2014-3199: Release Assert in V8 bindings. >- Replace chromium-support-ModeSwitch-key.patch by upstream version from > commit 8585724 > >* Fri Sep 26 2014 Andrey Cherepanov <cas@altlinux.org> 37.0.2062.124-alt2 >- New version >- Security fixes: > - CVE-2014-1568: RSA signature malleability in NSS >- Fix path and version detection of PepperFlash > >* Tue Sep 23 2014 Andrey Cherepanov <cas@altlinux.org> 37.0.2062.120-alt2 >- Fix RightAlt behaviour. See https://code.google.com/p/chromium/issues/detail?id=377203 > for details >- Build PDF viewer plugin > >* Thu Sep 18 2014 Andrey Cherepanov <cas@altlinux.org> 37.0.2062.120-alt1 >- New version >- Security fixes: > - High CVE-2014-3178: Use-after-free in rendering. >- Disable bundled binutils and gold > >* Wed Aug 27 2014 Andrey Cherepanov <cas@altlinux.org> 37.0.2062.94-alt1 >- New version >- Security fixes: > - Critical CVE-2014-3176, CVE-2014-3177: A special reward to > lokihardt@asrt for a combination of bugs in V8, IPC, sync, and > extensions that can lead to remote code execution outside of the > sandbox. > - High CVE-2014-3168: Use-after-free in SVG. > - High CVE-2014-3169: Use-after-free in DOM. > - High CVE-2014-3170: Extension permission dialog spoofing. > - High CVE-2014-3171: Use-after-free in bindings. > - Medium CVE-2014-3172: Issue related to extension debugging. > - Medium CVE-2014-3173: Uninitialized memory read in WebGL. > - Medium CVE-2014-3174: Uninitialized memory read in Web Audio. > >* Mon Aug 18 2014 Andrey Cherepanov <cas@altlinux.org> 36.0.1985.143-alt1 >- New version >- Security fixes: > - High CVE-2014-3165: Use-after-free in web sockets. > - High CVE-2014-3166: Information disclosure in SPDY. > >* Fri Jul 25 2014 Andrey Cherepanov <cas@altlinux.org> 36.0.1985.125-alt2 >- Fix small user interface fonts (see https://code.google.com/p/chromium/issues/detail?id=375824) > >* Thu Jul 17 2014 Andrey Cherepanov <cas@altlinux.org> 36.0.1985.125-alt1 >- New version >- Security fixes: > - Medium CVE-2014-3160: Same-Origin-Policy bypass in SVG. >- Fix wrong Russian translation (ALT #30182) >- Add flags to avoid memory exhaustion while linking on i586 >- Use internal version of v8 library > >* Mon Jul 14 2014 Andrey Cherepanov <cas@altlinux.org> 35.0.1916.153-alt1 >- New version >- Security fixes: > - High CVE-2014-3154: Use-after-free in filesystem api. > - High CVE-2014-3155: Out-of-bounds read in SPDY. > - Medium CVE-2014-3156: Buffer overflow in clipboard. > - CVE-2014-3157: Heap overflow in media. > >* Wed May 21 2014 Andrey Cherepanov <cas@altlinux.org> 35.0.1916.114-alt1 >- New version >- Security fixes: > - High CVE-2014-1743: Use-after-free in styles. > - High CVE-2014-1744: Integer overflow in audio. > - High CVE-2014-1745: Use-after-free in SVG. > - Medium CVE-2014-1746: Out-of-bounds read in media filters. > - Medium CVE-2014-1747: UXSS with local MHTML file. > - Medium CVE-2014-1748: UI spoofing with scrollbar. > >* Wed May 14 2014 Andrey Cherepanov <cas@altlinux.org> 34.0.1847.137-alt1 >- New version >- Security fixes: > - High CVE-2014-1740: Use-after-free in WebSockets. > - High CVE-2014-1741: Integer overflow in DOM ranges. > - High CVE-2014-1742: Use-after-free in editing. > >* Fri May 02 2014 Andrey Cherepanov <cas@altlinux.org> 34.0.1847.132-alt2 >- Add support for playing mp3 and mpeg4 (ALT #27863) >- Package icudtl.dat > >* Wed Apr 30 2014 Andrey Cherepanov <cas@altlinux.org> 34.0.1847.132-alt1 >- New version >- Security fixes: > - High CVE-2014-1731: Type confusion in DOM. > - Medium CVE-2014-1732: Use-after-free in Speech Recognition. > - Medium CVE-2014-1733: Compiler bug in Seccomp-BPF. > >* Tue Apr 15 2014 Andrey Cherepanov <cas@altlinux.org> 34.0.1847.116-alt1 >- New version >- Security fixes: > - High CVE-2014-1718: Integer overflow in compositor. > - High CVE-2014-1719: Use-after-free in web workers. > - High CVE-2014-1720: Use-after-free in DOM. > - High CVE-2014-1722: Use-after-free in rendering. > - High CVE-2014-1723: Url confusion with RTL characters. > - High CVE-2014-1724: Use-after-free in speech. > - Medium CVE-2014-1725: OOB read with window property. > - Medium CVE-2014-1726: Local cross-origin bypass. > - Medium CVE-2014-1727: Use-after-free in forms. >- Package depot-tools to correct build >- Do not show apps shortcut button on bookmark bar by default >- Switch build from make to ninja-build > >* Tue Mar 18 2014 Andrey Cherepanov <cas@altlinux.org> 33.0.1750.152-alt1 >- New version >- Security fixes: > - High CVE-2014-1713: Use-after-free in Blink bindings > - High CVE-2014-1705: Memory corruption in V8 > - High CVE-2014-1715: Directory traversal issue > >* Wed Mar 12 2014 Andrey Cherepanov <cas@altlinux.org> 33.0.1750.149-alt1 >- New version >- Security fixes: > - High CVE-2014-1700: Use-after-free in speech. > - High CVE-2014-1701: UXSS in events. > - High CVE-2014-1702: Use-after-free in web database. > >* Tue Mar 04 2014 Andrey Cherepanov <cas@altlinux.org> 33.0.1750.146-alt1 >- New version >- Security fixes: > - High CVE-2013-6663: Use-after-free in svg images. > - High CVE-2013-6664: Use-after-free in speech recognition. > - High CVE-2013-6665: Heap buffer overflow in software rendering. > - Medium CVE-2013-6666: Chrome allows requests in flash header request. > >* Fri Feb 21 2014 Andrey Cherepanov <cas@altlinux.org> 33.0.1750.117-alt1 >- New version >- Security fixes: > - High CVE-2013-6653: Use-after-free related to web contents. > - High CVE-2013-6654: Bad cast in SVG. > - High CVE-2013-6655: Use-after-free in layout. > - High CVE-2013-6656: Information leak in XSS auditor. > - Medium CVE-2013-6657: Information leak in XSS auditor. > - Medium CVE-2013-6658: Use-after-free in layout. > - Medium CVE-2013-6659: Issue with certificates validation in TLS handshake. > - Low CVE-2013-6660: Information leak in drag and drop. >- Update patches from SUSE, Debian and Arch > >* Tue Jan 28 2014 Andrey Cherepanov <cas@altlinux.org> 32.0.1700.102-alt1 >- New version >- Security fixes: > - High CVE-2013-6649: Use-after-free in SVG images. >- Fixes: > - Mouse Pointer disappears after exiting full-screen mode. (317496) > - Drag and drop files into Chrome may not work properly. (332579) > - Quicktime Plugin crashes in Chrome. (308466) > - Chrome becomes unresponsive. (335248) > - Trackpad users may not be able to scroll horizontally. (332797) > - Scrolling does not work in combo box. (334454) > - Chrome does not work with all CSS minifiers such as whitespace > around a media query's `and` keyword. (333035) > >* Tue Jan 21 2014 Andrey Cherepanov <cas@altlinux.org> 32.0.1700.77-alt1 >- New version >- Security fixes: > - High CVE-2013-6646: Use-after-free in web workers. > - High CVE-2013-6641: Use-after-free related to forms. > - High CVE-2013-6643: Unprompted sync with an attacker's Google account. > - Medium CVE-2013-6645 Use-after-free related to speech input elements. >- Set interpreter /bin/bash for main executable for correct ulimit call > >* Thu Dec 05 2013 Andrey Cherepanov <cas@altlinux.org> 31.0.1650.63-alt1 >- New version >- Security fixes: > - Medium CVE-2013-6634: Session fixation in sync related to 302 redirects. > - High CVE-2013-6635: Use-after-free in editing. > - Medium CVE-2013-6636: Address bar spoofing related to modal dialogs. >- Increase default nproc limit from 1024 to 1536 >- Remove SVN commit from release number > >* Fri Nov 15 2013 Andrey Cherepanov <cas@altlinux.org> 31.0.1650.57-alt1.r235101 >- New version >- Security fixes: > - Critical CVE-2013-6632: Multiple memory corruption issues > >* Wed Nov 13 2013 Andrey Cherepanov <cas@altlinux.org> 31.0.1650.48-alt1.r233213 >- New version >- Security fixes: > - Medium CVE-2013-6621: Use after free related to speech input elements. > - High CVE-2013-6622: Use after free related to media elements. > - High CVE-2013-6623: Out of bounds read in SVG. > - High CVE-2013-6624: Use after free related to "id" attribute strings. > - High CVE-2013-6625: Use after free in DOM ranges. > - Low CVE-2013-6626: Address bar spoofing related to interstitial warnings. > - High CVE-2013-6627: Out of bounds read in HTTP parsing. > - Medium CVE-2013-6628: Issue with certificates not being checked during TLS renegotiation. > >* Fri Oct 25 2013 Andrey Cherepanov <cas@altlinux.org> 30.0.1599.114-alt1.r229842 >- New version >- Move chrome_sandbox to %%_libdir/chromium/chrome-sandbox > >* Fri Oct 11 2013 Andrey Cherepanov <cas@altlinux.org> 30.0.1599.66-alt1.r225456 >- New version >- Security fixes: > - Medium CVE-2013-2906: Races in Web Audio. > - Medium CVE-2013-2907: Out of bounds read in Window.prototype object. > - Medium CVE-2013-2908: Address bar spoofing related to the "204 No Content" status code. > - High CVE-2013-2909: Use after free in inline-block rendering. > - Medium CVE-2013-2910: Use-after-free in Web Audio. > - High CVE-2013-2911: Use-after-free in XSLT. > - High CVE-2013-2912: Use-after-free in PPAPI. > - High CVE-2013-2913: Use-after-free in XML document parsing. > - Low CVE-2013-2915: Address bar spoofing via a malformed scheme. > - High CVE-2013-2916: Address bar spoofing related to the "204 No Content" status code. > - Medium CVE-2013-2917: Out of bounds read in Web Audio. > - High CVE-2013-2918: Use-after-free in DOM. > - High CVE-2013-2919: Memory corruption in V8. > - Medium CVE-2013-2920: Out of bounds read in URL parsing. > - High CVE-2013-2921: Use-after-free in resource loader. > - High CVE-2013-2922: Use-after-free in template element. > - CVE-2013-2923: Various fixes from internal audits, fuzzing and other initiatives. > >* Wed Sep 25 2013 Andrey Cherepanov <cas@altlinux.org> 29.0.1547.76-alt2.r223446 >- New version 29.0.1547.76 > >* Tue Sep 03 2013 Andrey Cherepanov <cas@altlinux.org> 29.0.1547.65-alt1.r220622 >- New version 29.0.1547.62 >- Security fixes: > - High CVE-2013-2900: Incomplete path sanitization in file handling. > - Low CVE-2013-2905: Information leak via overly broad permissions on > shared memory files. > - High CVE-2013-2901: Integer overflow in ANGLE. > - High CVE-2013-2902: Use after free in XSLT. > - High CVE-2013-2903: Use after free in media element. > - High CVE-2013-2904: Use after free in document parsing. >- Improved Omnibox suggestions based on the recency of sites you have > visited >- Ability to reset your profile back to its original state >- Many new apps and extensions APIs >- Lots of stability and performance improvements >- Fix an issue with printing from Google Docs applications >- Fix an issue with Sync > >* Wed Jul 31 2013 Dmitriy Kulik <lnkvisitor@altlinux.org> 28.0.1500.95-alt2.r213514 >- rebuild with versioned v8 > >* Wed Jul 31 2013 Andrey Cherepanov <cas@altlinux.org> 28.0.1500.95-alt1.r213514 >- New version 28.0.1500.95 >- Security fixes: > - Medium CVE-2013-2881: Origin bypass in frame handling. > - High CVE-2013-2883: Use-after-free in MutationObserver. > - High CVE-2013-2884: Use-after-free in DOM. > - High CVE-2013-2885: Use-after-free in input handling. > >* Wed Jul 24 2013 Andrey Cherepanov <cas@altlinux.org> 28.0.1500.71-alt1.r209842 >- New version 28.0.1500.71 >- Security fixes: > - High CVE-2013-2879: Confusion setting up sign-in and sync. > - Medium CVE-2013-2868: Incorrect sync of NPAPI extension component. > - Medium CVE-2013-2869: Out-of-bounds read in JPEG2000 handling. > - Critical CVE-2013-2870: Use-after-free with network sockets. > - Medium CVE-2013-2853: Man-in-the-middle attack against HTTP in SSL. > - High CVE-2013-2871: Use-after-free in input handling. > - High CVE-2013-2873: Use-after-free in resource loading. > - Medium CVE-2013-2875: Out-of-bounds-read in SVG. > - Medium CVE-2013-2876: Extensions permissions confusion with interstitials. > - Low CVE-2013-2877: Out-of-bounds read in XML parsing. > - None: Remove the "viewsource" attribute on iframes. > - Medium CVE-2013-2878: Out-of-bounds read in text handling. > - High CVE-2013-2880: Various fixes from internal audits, fuzzing and other initiatives > >* Wed Jun 05 2013 Andrey Cherepanov <cas@altlinux.org> 27.0.1453.110-alt1.r202711 >- New version 27.0.1453.110 >- Security fixes: > - Critical CVE-2013-2863: Memory corruption in SSL socket handling. > - High CVE-2013-2856: Use-after-free in input handling. > - High CVE-2013-2857: Use-after-free in image handling. > - High CVE-2013-2858: Use-after-free in HTML5 Audio. > - High CVE-2013-2859: Cross-origin namespace pollution. > - High CVE-2013-2860: Use-after-free with workers accessing database APIs. > - High CVE-2013-2861: Use-after-free with SVG. > - High CVE-2013-2862: Memory corruption in Skia GPU handling. > - High CVE-2013-2864: Bad free in PDF viewer. > - High CVE-2013-2865: Various fixes from internal audits, fuzzing and other initiatives. > - Medium CVE-2013-2855: Memory corruption in dev tools API. > >* Thu May 30 2013 Andrey Cherepanov <cas@altlinux.org> 27.0.1453.93-alt1.r200836 >- New version 27.0.1453.93 >- Security fixes: > - High CVE-2013-2836: Various fixes from internal audits, fuzzing and > other initiatives. > - High CVE-2013-2837: Use-after-free in SVG. > - High CVE-2013-2839: Bad cast in clipboard handling. > - High CVE-2013-2840: Use-after-free in media loader. > - High CVE-2013-2841: Use-after-free in Pepper resource handling. > - High CVE-2013-2842: Use-after-free in widget handling. > - High CVE-2013-2843: Use-after-free in speech handling. > - High CVE-2013-2844: Use-after-free in style resolution. > - High CVE-2013-2845: Memory safety issues in Web Audio. > - High CVE-2013-2846: Use-after-free in media loader. > - High CVE-2013-2847: Use-after-free race condition with workers. > - Medium CVE-2013-2848: Possible data extraction with XSS Auditor. > - Low CVE-2013-2849: Possible XSS with drag+drop or copy+paste. >- Web pages load 5%% faster on average >- New chrome.syncFileSystem API >- Improved ranking of predictions, improved spell correction, and > numerous fundamental improvements for Omnibox predictions. Please see > the Help Center for more information on our updated policies. > >* Mon May 13 2013 Andrey Cherepanov <cas@altlinux.org> 26.0.1410.57-alt1.r191765 >- New version 26.0.1410.57 >- Security fixes: > - High CVE-2013-0927: Unsafe config option loading in Pango. >- Requires new version speech-dispatcher > >* Sun Mar 31 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.172-alt4.r187217 >- Rebuild with libv8-3.15 > >* Wed Mar 27 2013 Andrey Cherepanov <cas@altlinux.org> 26.0.1410.43-alt1.r189671 >- New version 26.0.1410.43 >- Security fixes: > - Medium CVE-2013-0926: Avoid pasting active tags in certain situations. > - Low CVE-2013-0925: Avoid leaking URLs to extensions without the tabs permissions. > - Low CVE-2013-0924: Check an extension's permissions API usage again file permissions. > - Medium CVE-2013-0923: Memory safety issues in the USB Apps API. > - Low CVE-2013-0922: Avoid HTTP basic auth brute force attempts. > - High CVE-2013-0921: Ensure isolated web sites run in their own processes. > - Medium CVE-2013-0920: Use-after-free in extension bookmarks API. > - Medium CVE-2013-0919: Use-after-free with pop-up windows in extensions. > - Low CVE-2013-0918: Do not navigate dev tools upon drag and drop. > - Low CVE-2013-0917: Out-of-bounds read in URL loader. > - High CVE-2013-0916: Use-after-free in Web Audio. > >* Thu Mar 21 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.172-alt3.r187217 >- Add note that the keys for Google API are only to be used for ALT Linux >- Fix run script if CHROMIUM_ULIMIT is not set in /etc/chromium/default > >* Wed Mar 20 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.172-alt2.r187217 >- Build with access to Google API > >* Wed Mar 13 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.172-alt1.r187217 >- New version 25.0.1364.172 > >* Mon Mar 11 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.160-alt1.r186726 >- New version 25.0.1364.160 >- Security fixes: > - CVE-2013-0912: Type confusion in WebKit. >- Build with system libpng12 (old version) > >* Wed Mar 06 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.152-alt1.r185281 >- New version 25.0.1364.152 >- Security fixes: > - High CVE-2013-0902: Use-after-free in frame loader. > - High CVE-2013-0903: Use-after-free in browser navigation handling. > - High CVE-2013-0904: Memory corruption in Web Audio. > - High CVE-2013-0905: Use-after-free with SVG animations. > - High CVE-2013-0906: Memory corruption in Indexed DB. > - Medium CVE-2013-0907: Race condition in media thread handling. > - Medium CVE-2013-0908: Incorrect handling of bindings for extension processes. > - Low CVE-2013-0909: Referer leakage with XSS Auditor. > - Medium CVE-2013-0910: Mediate renderer -> browser plug-in loads more strictly. > - High CVE-2013-0911: Possible path traversal in database handling. >- Use builtin libpng > >* Fri Feb 22 2013 Andrey Cherepanov <cas@altlinux.org> 25.0.1364.97-alt1.r183676 >- New version 25.0.1364.97 >- Security fixes: > - High CVE-2013-0879: Memory corruption with web audio node. > - High CVE-2013-0880: Use-after-free in database handling. > - Medium CVE-2013-0881: Bad read in Matroska handling. > - High CVE-2013-0882: Bad memory access with excessive SVG parameters. > - Medium CVE-2013-0883: Bad read in Skia. > - Low CVE-2013-0884: Inappropriate load of NaCl. > - Medium CVE-2013-0885: Too many API permissions granted to web store. > - Low CVE-2013-0887: Developer tools process has too many permissions > and places too much trust in the connected server. > - Medium CVE-2013-0888: Out-of-bounds read in Skia. > - Low CVE-2013-0889: Tighten user gesture check for dangerous file > downloads. > - High CVE-2013-0890: Memory safety issues across the IPC layer. > - High CVE-2013-0891: Integer overflow in blob handling. > - Medium CVE-2013-0892: Lower severity issues across the IPC layer. > - Medium CVE-2013-0893: Race condition in media handling. > - High CVE-2013-0894: Buffer overflow in vorbis decoding. > - High CVE-2013-0895: Incorrect path handling in file copying. > - High CVE-2013-0896: Memory management issues in plug-in message > handling. > - Low CVE-2013-0897: Off-by-one read in PDF. > - High CVE-2013-0898: Use-after-free in URL handling. > - Low CVE-2013-0899: Integer overflow in Opus handling. > - Medium CVE-2013-0900: Race condition in ICU. > >* Thu Jan 31 2013 Andrey Cherepanov <cas@altlinux.org> 24.0.1312.57-alt1.r178923 >- New version 24.0.1312.57 >- Remove revision number from tarball name > >* Wed Jan 23 2013 Andrey Cherepanov <cas@altlinux.org> 24.0.1312.56-alt1.r177594 >- New version 24.0.1312.56 >- Security fixes: > - High CVE-2013-0839: Use-after-free in canvas font handling. > - Medium CVE-2013-0840: Missing URL validation when opening new windows. > - High CVE-2013-0841: Unchecked array index in content blocking. > - Medium CVE-2013-0842: Problems with NULL characters embedded in paths. > >* Mon Jan 14 2013 Andrey Cherepanov <cas@altlinux.org> 24.0.1312.52-alt1.r175374 >- New version 24.0.1312.52 >- Security fixes: > - High CVE-2012-5145: Use-after-free in SVG layout. > - High CVE-2012-5146: Same origin policy bypass with malformed URL. > - High CVE-2012-5147: Use-after-free in DOM handling. > - Medium CVE-2012-5148: Missing filename sanitization in hyphenation support. > - High CVE-2012-5149: Integer overflow in audio IPC handling. > - High CVE-2012-5150: Use-after-free when seeking video. > - High CVE-2012-5151: Integer overflow in PDF JavaScript. > - Medium CVE-2012-5152: Out-of-bounds read when seeking video. > - High CVE-2012-5156: Use-after-free in PDF fields. > - Medium CVE-2012-5157: Out-of-bounds reads in PDF image handling. > - High CVE-2013-0828: Bad cast in PDF root handling. > - High CVE-2013-0829: Corruption of database metadata leading to incorrect file access. > - Low CVE-2013-0831: Possible path traversal from extension process. > - Medium CVE-2013-0832: Use-after-free with printing. > - Medium CVE-2013-0833: Out-of-bounds read with printing. > - Medium CVE-2013-0834: Out-of-bounds read with glyph handling. > - Low CVE-2013-0835: Browser crash with geolocation. > - Medium CVE-2013-0837: Crash in extension tab handling. > - Low CVE-2013-0838: Tighten permissions on shared memory segments. >- Fixes: > - Add new option CHROMIUM_ULIMIT in /etc/chromium/default for increase > for example maximum number of open file descriptors ("-n 1024" > is recommended for many opened tabs) if needed. > >* Wed Dec 12 2012 Andrey Cherepanov <cas@altlinux.org> 23.0.1271.97-alt1.r171054 >- New version 23.0.1271.97 >- Security fixes: > - High CVE-2012-5139: Use-after-free with visibility events. > - High CVE-2012-5140: Use-after-free in URL loader. > - Medium CVE-2012-5141: Limit Chromoting client plug-in instantiation. > - Critical CVE-2012-5142: Crash in history navigation. > - Medium CVE-2012-5143: Integer overflow in PPAPI image buffers. > - High CVE-2012-5144: Stack corruption in AAC decoding. >- Fixes: > - Some texts in a Website Settings popup are trimmed > - <input> selection renders white text on white bg in apps > - some plugins stopped working > >* Fri Nov 30 2012 Andrey Cherepanov <cas@altlinux.org> 23.0.1271.95-alt1.r169798 >- New version 23.0.1271.95 >- Security fixes: > - High CVE-2012-5138: Incorrect file path handling. > - High CVE-2012-5137: Use-after-free in media source handling. > - High CVE-2012-5133: Use-after-free in SVG filters. > >* Thu Nov 08 2012 Andrey Cherepanov <cas@altlinux.org> 23.0.1271.64-alt1.r165196 >- New version 23.0.1271.64 >- Fixes: > - High CVE-2012-5116: Use-after-free in SVG filter handling. > - High CVE-2012-5121: Use-after-free in video layout. > - High CVE-2012-5124: Memory corruption in texture handling. > - Critical CVE-2012-5112: SVG use-after-free and IPC arbitrary file > write. > - High CVE-2012-2900: Crash in Skia text rendering. > - Critical CVE-2012-5108: Race condition in audio device handling. > - High CVE-2012-2896: Integer overflow in WebGL > - High CVE-2012-2895: Out-of-bounds writes in PDF viewer. > - High CVE-2012-2894: Crash in graphics context handling. > - High CVE-2012-2893: Double free in XSL transforms. > - High CVE-2012-2890: Use-after-free in PDF viewer. > - High CVE-2012-2889: UXSS in frame handling. > - High CVE-2012-2888: Use-after-free in SVG text references. > - High CVE-2012-2887: Use-after-free in onclick handling. > - High CVE-2012-2886: UXSS in v8 bindings. > - High CVE-2012-2883: Out-of-bounds write in Skia. > - High CVE-2012-2882: Wild pointer in OGG container handling. > - High CVE-2012-2881: DOM tree corruption with plug-ins. > - High CVE-2012-2878: Use-after-free in plug-in handling. > - High CVE-2012-2876: Buffer overflow in SSE2 optimizations. > - High CVE-2012-2874: Out-of-bounds write in Skia. >- Total move to system v8 >- Use builtin icu-4.6 and patched zlib (see http://code.google.com/p/chromium/issues/detail?id=143623) > >* Wed Oct 03 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1180.89-alt4.r154005 >- Set flags for build on ARM >- Rebuild with new version of v8 > >* Tue Oct 02 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1180.89-alt3.r154005 >- Enable video and audio support in HTML5 > >* Thu Sep 13 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1180.89-alt2.r154005 >- Disable debug version and fix problem with Google accounts (ALT 27731) >- Build with system icu libraries >- Open blank initial tab and distribution start page >- Add ALT-specific initial bookmarks > >* Fri Sep 07 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1180.89-alt1.r154005 >- New version 21.0.1180.89 >- Fixes: > - Several Pepper Flash fixes (Issue 140577, 144107, 140498, 142479) > - Microphone issues with tinychat.com (Issue: 143192) > - Devtools regression with "save as" of edited source (issue: 141180) > - Mini ninjas shaders fails (Issue: 142705) > - Page randomly turns red/green gradient boxes (Issue: 110343) > - Medium CVE-2012-2865: Out-of-bounds read in line breaking. > - High CVE-2012-2866: Bad cast with run-ins. > - Low CVE-2012-2867: Browser crash with SPDY. > - Medium CVE-2012-2868: Race condition with workers and XHR. > - High CVE-2012-2869: Avoid stale buffer in URL loading. > - Low CVE-2012-2870: Lower severity memory management issues in XPath. > - High CVE-2012-2871: Bad cast in XSL transforms. > - Medium CVE-2012-2872: XSS in SSL interstitial. >- Export patches and flags from Debian >- Disable tcmalloc > >* Fri Aug 24 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1180.81-alt1.r151980 >- New version 21.0.1180.81 >- Disable plugin installation >- Fix tcmalloc because glibc 2.16 removed the undocumented definition of > 'struct siginfo' from <bits/siginfo.h> > >* Wed Aug 15 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1158.0-alt5.r139751 >- Set appropriate desktop file name for default browser check > >* Mon Aug 13 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1158.0-alt4.r139751 >- Fix crash when displaying system print dialog on Linux > (http://code.google.com/p/chromium/issues/detail?id=130095) >- Rename .desktop file and add localization strings > >* Fri Aug 10 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1158.0-alt3.r139751 >- Add missing file chrome_sandbox > >* Thu Aug 09 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1158.0-alt2.r139751 >- Rename DE specific packages and set appropriate requirement to wallet subsystem >- Set alternatives to chromium-kde and chromium-gnome >- Add default parameters support in /etc/chromium/default > >* Wed Aug 08 2012 Andrey Cherepanov <cas@altlinux.org> 21.0.1158.0-alt1.r139751 >- Build for Sisyphus version 21.0.1158.0 (import from SUSE) >- Rename to chromium >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 31805
: 6494 |
6495