Package yandex-browser-stable: Information

    Source package: yandex-browser-stable
    Version: 24.12.4.1097-alt1
    Latest version according to Repology
    Build time:  Feb 14, 2025, 02:48 PM in the task #374582
    Category: Networking/WWW
    Report package bug
    Summary: Yandex Browser
    Description: 
    The web browser from Yandex
    
    Yandex Browser is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. Based on Chromium 130.0.6723.

    List of RPM packages built from this SRPM:
    yandex-browser-stable (x86_64)

    Maintainer: Yandex Browser Team


    ACL:
    Yandex Browser Team
    @everybody

      1. at-spi2-atk
      2. libX11
      3. libXcomposite
      4. libXdamage
      5. libXext
      6. libXfixes
      7. libXrandr
      8. libalsa
      9. libat-spi2-core
      10. libatk
      11. libnspr
      12. libnss
      13. libpango
      14. libqt5-core
      15. libqt5-gui
      16. libqt5-widgets
      17. libcairo
      18. libcups
      19. libdbus
      20. libdrm
      21. libexpat
      22. libgbm
      23. libwayland-client
      24. libxcb
      25. libxkbcommon
      26. libgio

    Last changed


    Feb. 13, 2025 Yandex Browser Team 24.12.4.1097-alt1
    - Browser updated to 24.12.4.1097
     + Critical CVE-2024-10487: Out of bounds write in Dawn
     + High CVE-2024-10488: Use after free in WebRTC
     + High CVE-2024-12694: Use after free in Compositing
     + High CVE-2025-0291: Type Confusion in V8
     + High CVE-2024-10826: Use after free in Family Experiences
     + High CVE-2024-10827: Use after free in Serial
     + Medium CVE-2025-0762: Use after free in DevTools
    Dec. 27, 2024 Yandex Browser Team 24.10.4.845-alt1
    - Browser updated to 24.10.4.845
    - Fixed local ffmpeg bug
    Dec. 17, 2024 Yandex Browser Team 24.10.4.818-alt1
    - Browser updated to 24.10.4.818
     + Critical CVE-2024-10487: Out of bounds write in Dawn
     + High CVE-2024-10229: Inappropriate implementation in Extensions
     + High CVE-2024-10488: Use after free in WebRTC
     + High CVE-2024-8636: Heap buffer overflow in Skia
     + High CVE-2024-8637: Use after free in Media Router
     + High CVE-2024-8638: Type Confusion in V8
     + High CVE-2024-8639: Use after free in Autofill
     + High CVE-2024-8362: Use after free in WebAudio
     + High CVE-2024-8193: Heap buffer overflow in Skia
     + High CVE-2024-8194: Type Confusion in V8
     + High CVE-2024-8198: Heap buffer overflow in Skia
     + High CVE-2024-7969: Type Confusion in V8
     + High CVE-2024-7964: Use after free in Passwords
     + High CVE-2024-7965: Inappropriate implementation in V8
     + High CVE-2024-7966: Out of bounds memory access in Skia
     + High CVE-2024-7967: Heap buffer overflow in Fonts
     + High CVE-2024-7968: Use after free in Autofill
     + High CVE-2024-7971: Type confusion in V8
     + High CVE-2024-7970: Out of bounds write in V8
     + Medium CVE-2024-7972: Inappropriate implementation in V8
     + Medium CVE-2024-7973: Heap buffer overflow in PDFium
     + Medium CVE-2024-7974: Insufficient data validation in V8 API
     + Medium CVE-2024-7975: Inappropriate implementation in Permissions
     + Medium CVE-2024-7976: Inappropriate implementation in FedCM
     + Medium CVE-2024-7977: Insufficient data validation in Installer
     + Medium CVE-2024-7978: Insufficient policy enforcement in Data Transfer
     + Medium CVE-2024-7979: Insufficient data validation in Installer
     + Medium CVE-2024-7980: Insufficient data validation in Installer
     + Low CVE-2024-7981: Inappropriate implementation in Views
     + Low CVE-2024-8033: Inappropriate implementation in WebApp Installs
     + Low CVE-2024-8034: Inappropriate implementation in Custom Tabs
     + Low CVE-2024-8035: Inappropriate implementation in Extensions