Пакет yandex-browser-stable: Информация

  • Default inline alert: Версия в репозитории: 24.1.3.845-alt1

Исходный пакет: yandex-browser-stable
Версия: 23.11.1.802-alt2
Последняя версия по данным Repology
Собран:  11 января 2024 г. 18:59 в задании #336400
Категория: Сети/WWW
Сообщить об ошибке в пакете
Домашняя страница: http://browser.yandex.ru/

Лицензия: ALT-YANDEX-BROWSER
О пакете: Yandex Browser
Описание: 
The web browser from Yandex

Yandex Browser is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
yandex-browser-stable (x86_64)

Сопровождающий: Yandex Browser Team


Права:
Yandex Browser Team
@everybody

    1. libcairo
    2. libqt5-core
    3. libqt5-gui
    4. libqt5-widgets
    5. libcups
    6. libdbus
    7. libdrm
    8. libexpat
    9. libgbm
    10. libgio
    11. libX11
    12. libXcomposite
    13. libXdamage
    14. at-spi2-atk
    15. libXext
    16. libXfixes
    17. libXrandr
    18. libalsa
    19. libat-spi2-core
    20. libatk
    21. libwayland-client
    22. libxcb
    23. libxkbcommon
    24. libnspr
    25. libnss
    26. libpango

Последнее изменение


18 декабря 2023 г. Yandex Browser Team 23.11.1.802-alt2
- Removed excessive copy routine from spec-file
18 декабря 2023 г. Yandex Browser Team 23.11.1.802-alt1
- Browser updated to 23.11.1.802
12 декабря 2023 г. Yandex Browser Team 23.11.1.783-alt1
- Browser updated to 23.11.1.783
 + Critical CVE-2023-4863: Heap buffer overflow in WebP.
 + Critical CVE-2023-5218: Use after free in Site Isolation.
 + High CVE-2023-5472: Use after free in Profiles.
 + High CVE-2023-5346: Type Confusion in V8.
 + High CVE-2023-5217: Heap buffer overflow in vp8 encoding in libvpx.
 + High CVE-2023-5186: Use after free in Passwords.
 + High CVE-2023-5187: Use after free in Extensions.
 + Medium CVE-2023-5487: Inappropriate implementation in Fullscreen.
 + Medium CVE-2023-5484: Inappropriate implementation in Navigation.
 + Medium CVE-2023-5475: Inappropriate implementation in DevTools.
 + Medium CVE-2023-5483: Inappropriate implementation in Intents.
 + Medium CVE-2023-5481: Inappropriate implementation in Downloads.
 + Medium CVE-2023-5476: Use after free in Blink History.
 + Medium CVE-2023-5474: Heap buffer overflow in PDF.
 + Medium CVE-2023-5479: Inappropriate implementation in Extensions API.
 + Medium CVE-2023-4900: Inappropriate implementation in Custom Tabs.
 + Medium CVE-2023-4901: Inappropriate implementation in Prompts.
 + Medium CVE-2023-4902: Inappropriate implementation in Input.
 + Medium CVE-2023-4903: Inappropriate implementation in Custom Mobile Tabs.
 + Medium CVE-2023-4904: Insufficient policy enforcement in Downloads.
 + Medium CVE-2023-4905: Inappropriate implementation in Prompts.
 + Low CVE-2023-4906: Insufficient policy enforcement in Autofill.
 + Low CVE-2023-4907: Inappropriate implementation in Intents.
 + Low CVE-2023-4908: Inappropriate implementation in Picture in Picture.
 + Low CVE-2023-4909: Inappropriate implementation in Interstitials.
 + Low CVE-2023-5485: Inappropriate implementation in Autofill.
 + Low CVE-2023-5478: Inappropriate implementation in Autofill.
 + Low CVE-2023-5477: Inappropriate implementation in Installer.
 + Low CVE-2023-5486: Inappropriate implementation in Input.
 + Low CVE-2023-5473: Use after free in Cast.