* CVE-2018-6085: Use after free in Disk Cache
* CVE-2018-6086: Use after free in Disk Cache
* CVE-2018-6087: Use after free in WebAssembly
* CVE-2018-6088: Use after free in PDFium
* CVE-2018-6089: Same origin policy bypass in Service Worker
* CVE-2018-6090: Heap buffer overflow in Skia
* CVE-2018-6091: Incorrect handling of plug-ins by Service Worker
* CVE-2018-6092: Integer overflow in WebAssembly
* CVE-2018-6093: Same origin bypass in Service Worker
* CVE-2018-6094: Exploit hardening regression in Oilpan
* CVE-2018-6095: Lack of meaningful user interaction requirement before file upload
* CVE-2018-6096: Fullscreen UI spoof
* CVE-2018-6097: Fullscreen UI spoof
* CVE-2018-6098: URL spoof in Omnibox
* CVE-2018-6099: CORS bypass in ServiceWorker
* CVE-2018-6100: URL spoof in Omnibox
* CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools
* CVE-2018-6102: URL spoof in Omnibox
* CVE-2018-6103: UI spoof in Permissions
* CVE-2018-6104: URL spoof in Omnibox
* CVE-2018-6105: URL spoof in Omnibox
* CVE-2018-6106: Incorrect handling of promises in V8
* CVE-2018-6107: URL spoof in Omnibox
* CVE-2018-6108: URL spoof in Omnibox
* CVE-2018-6109: Incorrect handling of files by FileAPI
* CVE-2018-6110: Incorrect handling of plaintext files via file://
* CVE-2018-6111: Heap-use-after-free in DevTools
* CVE-2018-6112: Incorrect URL handling in DevTools
* CVE-2018-6113: URL spoof in Navigation
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1115
* CVE-2018-6085: Use after free in Disk Cache
* CVE-2018-6086: Use after free in Disk Cache
* CVE-2018-6087: Use after free in WebAssembly
* CVE-2018-6088: Use after free in PDFium
* CVE-2018-6089: Same origin policy bypass in Service Worker
* CVE-2018-6090: Heap buffer overflow in Skia
* CVE-2018-6091: Incorrect handling of plug-ins by Service Worker
* CVE-2018-6092: Integer overflow in WebAssembly
* CVE-2018-6093: Same origin bypass in Service Worker
* CVE-2018-6094: Exploit hardening regression in Oilpan
* CVE-2018-6095: Lack of meaningful user interaction requirement before file upload
* CVE-2018-6096: Fullscreen UI spoof
* CVE-2018-6097: Fullscreen UI spoof
* CVE-2018-6098: URL spoof in Omnibox
* CVE-2018-6099: CORS bypass in ServiceWorker
* CVE-2018-6100: URL spoof in Omnibox
* CVE-2018-6101: Insufficient protection of remote debugging prototol in DevTools
* CVE-2018-6102: URL spoof in Omnibox
* CVE-2018-6103: UI spoof in Permissions
* CVE-2018-6104: URL spoof in Omnibox
* CVE-2018-6105: URL spoof in Omnibox
* CVE-2018-6106: Incorrect handling of promises in V8
* CVE-2018-6107: URL spoof in Omnibox
* CVE-2018-6108: URL spoof in Omnibox
* CVE-2018-6109: Incorrect handling of files by FileAPI
* CVE-2018-6110: Incorrect handling of plaintext files via file://
* CVE-2018-6111: Heap-use-after-free in DevTools
* CVE-2018-6112: Incorrect URL handling in DevTools
* CVE-2018-6113: URL spoof in Navigation
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1115
- Up to 66.0.3359.81
- Bump to 66.0.3359.66
- Update chromium-gcc7.patch to include more quirks
- Bump to 66.0.3359.45
- Bump to 66.0.3359.33
- Version bump to 66.0.3359.26
- Bump the requirement for the clang version
- Conditionalize harfbuzz switch
- Update to 66.0.3359.22
- Apply patches using %autopatch
- Add patch to build with gcc7 properly chromium-gcc7.patch
- Drop patch chromium-sandbox-pie.patch as we have pie default now
- Add patch to build with leap variant of drm chromium-drm.patch
- Add patch to build ffmpeg from system chromium-ffmpeg.patch
- Up to 66.0.3355.0
- Disable clang by default again
- Up to 66.0.3350.0
- Drop patch fix_network_api_crash.patch
- Bump to 66.0.3343.3
- Bump to 65.0.3325.51
- Disable gconf support
- Bump to 65.0.3325.31
- Update to 65.0.3325.18
- Try to have automatic ozone platform detection
OBS-URL: https://build.opensuse.org/request/show/597716
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1114
- Up to 66.0.3359.81
- Bump to 66.0.3359.66
- Update chromium-gcc7.patch to include more quirks
- Bump to 66.0.3359.45
- Bump to 66.0.3359.33
- Version bump to 66.0.3359.26
- Bump the requirement for the clang version
- Conditionalize harfbuzz switch
- Update to 66.0.3359.22
- Apply patches using %autopatch
- Add patch to build with gcc7 properly chromium-gcc7.patch
- Drop patch chromium-sandbox-pie.patch as we have pie default now
- Add patch to build with leap variant of drm chromium-drm.patch
- Add patch to build ffmpeg from system chromium-ffmpeg.patch
- Up to 66.0.3355.0
- Disable clang by default again
- Up to 66.0.3350.0
- Drop patch fix_network_api_crash.patch
- Bump to 66.0.3343.3
- Bump to 65.0.3325.51
- Disable gconf support
- Bump to 65.0.3325.31
- Update to 65.0.3325.18
- Try to have automatic ozone platform detection
OBS-URL: https://build.opensuse.org/request/show/597716
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1114
* High CVE-2017-11215: Use after free in Flash.
* High CVE-2017-11225: Use after free in Flash.
* High CVE-2018-6060: Use after free in Blink.
* High CVE-2018-6061: Race condition in V8.
* High CVE-2018-6062: Heap buffer overflow in Skia.
* High CVE-2018-6057: Incorrect permissions on shared memory.
* High CVE-2018-6063: Incorrect permissions on shared memory.
* High CVE-2018-6064: Type confusion in V8.
* High CVE-2018-6065: Integer overflow in V8.
* Medium CVE-2018-6066: Same Origin Bypass via canvas.
* Medium CVE-2018-6067: Buffer overflow in Skia.
* Medium CVE-2018-6068: Object lifecycle issues in Chrome Custom Tab.
* Medium CVE-2018-6069: Stack buffer overflow in Skia.
* Medium CVE-2018-6070: CSP bypass through extensions.
* Medium CVE-2018-6071: Heap bufffer overflow in Skia.
* Medium CVE-2018-6072: Integer overflow in PDFium.
* Medium CVE-2018-6073: Heap bufffer overflow in WebGL.
* Medium CVE-2018-6074: Mark-of-the-Web bypass.
* Medium CVE-2018-6075: Overly permissive cross origin downloads.
* Medium CVE-2018-6076: Incorrect handling of URL fragment identifiers in Blink.
* Medium CVE-2018-6077: Timing attack using SVG filters.
* Medium CVE-2018-6078: URL Spoof in OmniBox.
* Medium CVE-2018-6079: Information disclosure via texture data in WebGL.
* Medium CVE-2018-6080: Information disclosure in IPC call.
* Low CVE-2018-6081: XSS in interstitials.
* Low CVE-2018-6082: Circumvention of port blocking.
* Low CVE-2018-6083: Incorrect processing of AppManifests.
- Add new patches:
* chromium-compiler.patch
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1097
- Bump to 65.0.3325.146
- Add another codepoint to chromium-non-void-return.patch
- Bump to 65.0.3325.106
- Add patch for mojo build with gcc mojo.patch
- Keep ozone still disabled
- Build with clang now
- Update fix-gn-bootstrap.diff
- Add patch chromium-glibc-2.27.patch
- Add patch chromium-compiler.patch
- Bump to 65.0.3325.73
- Bump to 65.0.3325.51
- Disable gconf support
- Bump to 65.0.3325.31
- Update to 65.0.3325.18
- Try to have automatic ozone platform detection
- Bump to 65.0.3322.3
- Bump to 65.0.3311.3
- Drop chromium-63.0.3289.84-fix-ft-hb-unbundle.patch
- add chromium-63.0.3289.84-fix-ft-hb-unbundle.patch to make sure
we use system freetype/harfbuzz
- Make sure to use system freetype too
OBS-URL: https://build.opensuse.org/request/show/584217
OBS-URL: https://build.opensuse.org/package/show/network:chromium/chromium?expand=0&rev=1096