Пакет yandex-browser-stable: Информация

  • Default inline alert: Версия в репозитории: 24.1.3.845-alt1

Исходный пакет: yandex-browser-stable
Версия: 23.9.1.1033-alt1
Собран:  30 октября 2023 г. 20:12 в задании #331675
Категория: Сети/WWW
Сообщить об ошибке в пакете
Домашняя страница: http://browser.yandex.ru/

Лицензия: ALT-YANDEX-BROWSER
О пакете: Yandex Browser
Описание: 
The web browser from Yandex

Yandex Browser is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
yandex-browser-stable (x86_64)

Сопровождающий: Yandex Browser Team


    1. libX11
    2. libXcomposite
    3. libXdamage
    4. libXext
    5. libXfixes
    6. libXrandr
    7. libalsa
    8. libat-spi2-core
    9. libatk
    10. at-spi2-atk
    11. libnspr
    12. libwayland-client
    13. libnss
    14. libxcb
    15. libxkbcommon
    16. libpango
    17. libqt5-core
    18. libqt5-gui
    19. libqt5-widgets
    20. libcairo
    21. libcups
    22. libdbus
    23. libdrm
    24. libexpat
    25. libgbm
    26. libgio

Последнее изменение


11 октября 2023 г. Yandex Browser Team 23.9.1.1033-alt1
- Browser updated to 23.9.1.1033
10 октября 2023 г. Yandex Browser Team 23.9.1.1015-alt1
- Browser updated to 23.9.1.1015
 + Critical CVE-2023-4863: Heap buffer overflow in WebP.
 + High CVE-2023-2312: Use after free in Offline.
 + High CVE-2023-3727: Use after free in WebRTC.
 + High CVE-2023-3730: Use after free in Tab Groups.
 + High CVE-2023-3732: Out of bounds memory access in Mojo.
 + High CVE-2023-4068: Type Confusion in V8.
 + High CVE-2023-4069: Type Confusion in V8.
 + High CVE-2023-4070: Type Confusion in V8.
 + High CVE-2023-4071: Heap buffer overflow in Visuals.
 + High CVE-2023-4072: Out of bounds read and write in WebGL.
 + High CVE-2023-4073: Out of bounds memory access in ANGLE.
 + High CVE-2023-4074: Use after free in Blink Task Scheduling.
 + High CVE-2023-4075: Use after free in Cast.
 + High CVE-2023-4076: Use after free in WebRTC.
 + High CVE-2023-4349: Use after free in Device Trust Connectors.
 + High CVE-2023-4350: Inappropriate implementation in Fullscreen.
 + High CVE-2023-4351: Use after free in Network.
 + High CVE-2023-4352: Type Confusion in V8.
 + High CVE-2023-4353: Heap buffer overflow in ANGLE.
 + High CVE-2023-4354: Heap buffer overflow in Skia.
 + High CVE-2023-4355: Out of bounds memory access in V8.
 + High CVE-2023-4427: Out of bounds memory access in V8.
 + High CVE-2023-4428: Out of bounds memory access in CSS.
 + High CVE-2023-4429: Use after free in Loader.
 + High CVE-2023-4430: Use after free in Vulkan.
 + High CVE-2023-4572: Use after free in MediaStream.
 + High CVE-2023-4761: Out of bounds memory access in FedCM.
 + High CVE-2023-4762: Type Confusion in V8.
 + High CVE-2023-4763: Use after free in Networks.
 + High CVE-2023-4764: Incorrect security UI in BFCache.
 + High CVE-2023-5186: Use after free in Passwords.
 + High CVE-2023-5187: Use after free in Extensions.
 + High CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx.
 + High CVE-2023-5346: Type Confusion in V8.
 + Medium CVE-2023-3733: Inappropriate implementation in WebApp Installs.
 + Medium CVE-2023-3734: Inappropriate implementation in Picture In Picture.
 + Medium CVE-2023-3735: Inappropriate implementation in Web API Permission Prompts.
 + Medium CVE-2023-3736: Inappropriate implementation in Custom Tabs.
 + Medium CVE-2023-3737: Inappropriate implementation in Notifications.
 + Medium CVE-2023-3738: Inappropriate implementation in Autofill.
 + Medium CVE-2023-4077: Insufficient data validation in Extensions.
 + Medium CVE-2023-4078: Inappropriate implementation in Extensions.
 + Medium CVE-2023-4356: Use after free in Audio.
 + Medium CVE-2023-4357: Insufficient validation of untrusted input in XML.
 + Medium CVE-2023-4358: Use after free in DNS.
 + Medium CVE-2023-4359: Inappropriate implementation in App Launcher.
 + Medium CVE-2023-4360: Inappropriate implementation in Color.
 + Medium CVE-2023-4361: Inappropriate implementation in Autofill.
 + Medium CVE-2023-4362: Heap buffer overflow in Mojom IDL.
 + Medium CVE-2023-4363: Inappropriate implementation in WebShare.
 + Medium CVE-2023-4364: Inappropriate implementation in Permission Prompts.
 + Medium CVE-2023-4365: Inappropriate implementation in Fullscreen.
 + Medium CVE-2023-4366: Use after free in Extensions.
 + Medium CVE-2023-4367: Insufficient policy enforcement in Extensions API.
 + Medium CVE-2023-4368: Insufficient policy enforcement in Extensions API.
 + Medium CVE-2023-4431: Out of bounds memory access in Fonts.
 + Medium CVE-2023-4900: Inappropriate implementation in Custom Tabs.
 + Medium CVE-2023-4901: Inappropriate implementation in Prompts.
 + Medium CVE-2023-4902: Inappropriate implementation in Input.
 + Medium CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs.
 + Medium CVE-2023-4904: Insufficient policy enforcement in Downloads.
 + Medium CVE-2023-4905: Inappropriate implementation in Prompts.
 + Low CVE-2023-3740: Insufficient validation of untrusted input in Themes.
 + Low CVE-2023-4906: Insufficient policy enforcement in Autofill.
 + Low CVE-2023-4907: Inappropriate implementation in Intents.
 + Low CVE-2023-4908: Inappropriate implementation in Picture in Picture.
 + Low CVE-2023-4909: Inappropriate implementation in Interstitials.
5 сентября 2023 г. Yandex Browser Team 23.7.4.983-alt1
- Browser updated to 23.7.4.983