Пакет yandex-browser-stable: Информация

  • Default inline alert: Версия в репозитории: 24.1.3.845-alt1

Исходный пакет: yandex-browser-stable
Версия: 23.3.1.946-alt1
Собран:  4 мая 2023 г. 17:56 в задании #319296
Категория: Сети/WWW
Сообщить об ошибке в пакете
Домашняя страница: http://browser.yandex.ru/

Лицензия: ALT-YANDEX-BROWSER
О пакете: Yandex Browser
Описание: 
The web browser from Yandex

Yandex Browser is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
yandex-browser-stable (x86_64)

Сопровождающий: Yandex Browser Team


    1. libwayland-client
    2. at-spi2-atk
    3. libxcb
    4. libxkbcommon
    5. libnspr
    6. libnss
    7. libpango
    8. libcairo
    9. libcups
    10. libdbus
    11. libqt5-core
    12. libqt5-gui
    13. libdrm
    14. libqt5-widgets
    15. libexpat
    16. libgbm
    17. libX11
    18. libXcomposite
    19. libgio
    20. libXdamage
    21. libXext
    22. libXfixes
    23. libXrandr
    24. libalsa
    25. libat-spi2-core
    26. libatk

Последнее изменение


25 апреля 2023 г. Yandex Browser Team 23.3.1.946-alt1
- Browser updated to 23.3.1.946
  + Critical CVE-2023-2033: Type confusion in V8
17 апреля 2023 г. Yandex Browser Team 23.3.1.929-alt1
- Browser updated to 23.3.1.929
- Fix installation of partner data
11 апреля 2023 г. Yandex Browser Team 23.3.1.916-alt1
- Browser updated to 23.3.1
  + Critical CVE-2023-0941: Use after free in Prompts.
  + High CVE-2023-0927: Use after free in Web Payments API.
  + High CVE-2023-0928: Use after free in SwiftShader.
  + High CVE-2023-0929: Use after free in Vulkan.
  + High CVE-2023-0930: Heap buffer overflow in Video.
  + High CVE-2023-0931: Use after free in Video.
  + High CVE-2023-0932: Use after free in WebRTC.
  + Medium CVE-2023-0933: Integer overflow in PDF.
  + High CVE-2023-0696: Type Confusion in V8.
  + High CVE-2023-0697: Inappropriate implementation in Full screen mode.
  + High CVE-2023-0698: Out of bounds read in WebRTC.
  + Medium CVE-2023-0699: Use after free in GPU.
  + Medium CVE-2023-0700: Inappropriate implementation in Download.
  + Medium CVE-2023-0701: Heap buffer overflow in WebUI.
  + Medium CVE-2023-0702: Type Confusion in Data Transfer.
  + Medium CVE-2023-0703: Type Confusion in DevTools.
  + Low CVE-2023-0704: Insufficient policy enforcement in DevTools.
  + Low CVE-2023-0705: Integer overflow in Core.
  + High CVE-2023-0471: Use after free in WebTransport.
  + High CVE-2023-0472: Use after free in WebRTC.
  + Medium CVE-2023-0473: Type Confusion in ServiceWorker API.
  + Medium CVE-2023-0474: Use after free in GuestView.
  + High CVE-2023-0128: Use after free in Overview Mode.
  + High CVE-2023-0129: Heap buffer overflow in Network Service.
  + Medium CVE-2023-0130: Inappropriate implementation in Fullscreen API.
  + Medium CVE-2023-0131: Inappropriate implementation in iframe Sandbox.
  + Medium CVE-2023-0132: Inappropriate implementation in Permission prompts.
  + Medium CVE-2023-0133: Inappropriate implementation in Permission prompts.
  + Medium CVE-2023-0134: Use after free in Cart.
  + Medium CVE-2023-0135: Use after free in Cart.
  + Medium CVE-2023-0136: Inappropriate implementation in Fullscreen API.
  + Medium CVE-2023-0137: Heap buffer overflow in Platform Apps.
  + Low CVE-2023-0138: Heap buffer overflow in libphonenumber.
  + Low CVE-2023-0139: Insufficient validation of untrusted input in Downloads.
  + Low CVE-2023-0140: Inappropriate implementation in File System API.
  + Low CVE-2023-0141: Insufficient policy enforcement in CORS.
- Set provides webclient (closes: #43564)