Package yandex-browser-stable: Information

Source package: yandex-browser-stable
Version: 23.1.2.1033-alt1
Latest version according to Repology
Build time:  Mar 28, 2023, 06:17 PM in the task #317119
Category: Networking/WWW
Report package bug
Summary: Yandex Browser
Description: 
The web browser from Yandex

Yandex Browser is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

List of rpms provided by this srpm:
yandex-browser-stable (x86_64)

Maintainer: Yandex Browser Team


ACL:
Yandex Browser Team
@everybody

    1. at-spi2-atk
    2. libwayland-client
    3. libxcb
    4. libxkbcommon
    5. libnspr
    6. libnss
    7. libpango
    8. libcairo
    9. libqt5-core
    10. libqt5-gui
    11. libqt5-widgets
    12. libcups
    13. libdbus
    14. libdrm
    15. libexpat
    16. libgbm
    17. libgio
    18. libX11
    19. libXcomposite
    20. libXdamage
    21. libXext
    22. libXfixes
    23. libXrandr
    24. libalsa
    25. libat-spi2-core
    26. libatk

Last changed


March 20, 2023 Yandex Browser Team 23.1.2.1033-alt1
- browser updated to 23.1.2
 - High CVE-2022-4436: Use after free in Blink Media.
 - High CVE-2022-4437: Use after free in Mojo IPC.
 - High CVE-2022-4438: Use after free in Blink Frames.
 - High CVE-2022-4439: Use after free in Aura.
 - Medium CVE-2022-4440: Use after free in Profiles.
 - High CVE-2022-4262: Type Confusion in V8.
 - High CVE-2022-4174: Type Confusion in V8.
 - High CVE-2022-4175: Use after free in Camera Capture.
 - High CVE-2022-4176: Out of bounds write in Lacros Graphics.
 - High CVE-2022-4177: Use after free in Extensions.
 - High CVE-2022-4178: Use after free in Mojo.
 - High CVE-2022-4179: Use after free in Audio.
 - High CVE-2022-4180: Use after free in Mojo.
 - High CVE-2022-4181: Use after free in Forms.
 - Medium CVE-2022-4182: Inappropriate implementation in Fenced Frames.
 - Medium CVE-2022-4183: Insufficient policy enforcement in Popup Blocker.
 - Medium CVE-2022-4184: Insufficient policy enforcement in Autofill.
 - Medium CVE-2022-4185: Inappropriate implementation in Navigation.
 - Medium CVE-2022-4186: Insufficient validation of untrusted input in Downloads.
 - Medium CVE-2022-4187: Insufficient policy enforcement in DevTools.
 - Medium CVE-2022-4188: Insufficient validation of untrusted input in CORS.
 - Medium CVE-2022-4189: Insufficient policy enforcement in DevTools.
 - Medium CVE-2022-4190: Insufficient data validation in Directory.
 - Medium CVE-2022-4191: Use after free in Sign-In.
 - Medium CVE-2022-4192: Use after free in Live Caption.
 - Medium CVE-2022-4193: Insufficient policy enforcement in File System API.
 - Medium CVE-2022-4194: Use after free in Accessibility.
 - Medium CVE-2022-4195: Insufficient policy enforcement in Safe Browsing.
 - High CVE-2022-4135: Heap buffer overflow in GPU.
 - High CVE-2022-3885: Use after free in V8.
 - High CVE-2022-3886: Use after free in Speech Recognition.
 - High CVE-2022-3887: Use after free in Web Workers.
 - High CVE-2022-3888: Use after free in WebCodecs.
 - High CVE-2022-3889: Type Confusion in V8.
 - High CVE-2022-3890: Heap buffer overflow in Crashpad.
 - High CVE-2022-3723: Type Confusion in V8.
 - High CVE-2022-3652: Type Confusion in V8.
 - High CVE-2022-3653: Heap buffer overflow in Vulkan.
 - High CVE-2022-3654: Use after free in Layout.
 - Medium CVE-2022-3655: Heap buffer overflow in Media Galleries.
 - Medium CVE-2022-3656: Insufficient data validation in File System.
 - Medium CVE-2022-3657: Use after free in Extensions.
 - Medium CVE-2022-3658: Use after free in Feedback service on Chrome OS.
 - Medium CVE-2022-3659: Use after free in Accessibility.
 - Medium CVE-2022-3660: Inappropriate implementation in Full screen mode.
 - Low CVE-2022-3661: Insufficient data validation in Extensions.
Jan. 23, 2023 Andrey Cherepanov 22.11.0.2485-alt1.1
- NMU: supported proxy settings from environment variables (ALT #44983) 
- NMU: FTBFS fix: required libwayland-client
Nov. 23, 2022 Vasiliy Tsukanov 22.11.0.2485-alt1
- browser updated to 22.11.0