<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>43564</bug_id>
          
          <creation_ts>2022-08-18 11:56:31 +0300</creation_ts>
          <short_desc>Не предоставляет webclient</short_desc>
          <delta_ts>2023-04-11 15:25:26 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>yandex-browser-stable</component>
          <version>unstable</version>
          <rep_platform>x86_64</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Sergey V Turchin">zerg</reporter>
          <assigned_to name="aleksei.yanlin@yandex.ru">yabro</assigned_to>
          <cc>palar</cc>
    
    <cc>yabro</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>213825</commentid>
    <comment_count>0</comment_count>
    <who name="Sergey V Turchin">zerg</who>
    <bug_when>2022-08-18 11:56:31 +0300</bug_when>
    <thetext>В spec нужно добавить

Provides: webclient

, чтоб быть как остальные веб-браузеры.
См. `apt-get install webclient`</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>213826</commentid>
    <comment_count>1</comment_count>
    <who name="Sergey V Turchin">zerg</who>
    <bug_when>2022-08-18 11:57:37 +0300</bug_when>
    <thetext>Это не горит, но в следующей сборке не забудьте, пожалуйста.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>224320</commentid>
    <comment_count>2</comment_count>
    <who name="Repository Robot">repository-robot</who>
    <bug_when>2023-04-11 15:25:26 +0300</bug_when>
    <thetext>yandex-browser-stable-23.3.1.916-alt1 -&gt; sisyphus:

 Tue Apr 11 2023 yabro &lt;yabro@altlinux&gt; 23.3.1.916-alt1
 - Browser updated to 23.3.1
   + Critical CVE-2023-0941: Use after free in Prompts.
   + High CVE-2023-0927: Use after free in Web Payments API.
   + High CVE-2023-0928: Use after free in SwiftShader.
   + High CVE-2023-0929: Use after free in Vulkan.
   + High CVE-2023-0930: Heap buffer overflow in Video.
   + High CVE-2023-0931: Use after free in Video.
   + High CVE-2023-0932: Use after free in WebRTC.
   + Medium CVE-2023-0933: Integer overflow in PDF.
   + High CVE-2023-0696: Type Confusion in V8.
   + High CVE-2023-0697: Inappropriate implementation in Full screen mode.
   + High CVE-2023-0698: Out of bounds read in WebRTC.
   + Medium CVE-2023-0699: Use after free in GPU.
   + Medium CVE-2023-0700: Inappropriate implementation in Download.
   + Medium CVE-2023-0701: Heap buffer overflow in WebUI.
   + Medium CVE-2023-0702: Type Confusion in Data Transfer.
   + Medium CVE-2023-0703: Type Confusion in DevTools.
   + Low CVE-2023-0704: Insufficient policy enforcement in DevTools.
   + Low CVE-2023-0705: Integer overflow in Core.
   + High CVE-2023-0471: Use after free in WebTransport.
   + High CVE-2023-0472: Use after free in WebRTC.
   + Medium CVE-2023-0473: Type Confusion in ServiceWorker API.
   + Medium CVE-2023-0474: Use after free in GuestView.
   + High CVE-2023-0128: Use after free in Overview Mode.
   + High CVE-2023-0129: Heap buffer overflow in Network Service.
   + Medium CVE-2023-0130: Inappropriate implementation in Fullscreen API.
   + Medium CVE-2023-0131: Inappropriate implementation in iframe Sandbox.
   + Medium CVE-2023-0132: Inappropriate implementation in Permission prompts.
   + Medium CVE-2023-0133: Inappropriate implementation in Permission prompts.
   + Medium CVE-2023-0134: Use after free in Cart.
   + Medium CVE-2023-0135: Use after free in Cart.
   + Medium CVE-2023-0136: Inappropriate implementation in Fullscreen API.
   + Medium CVE-2023-0137: Heap buffer overflow in Platform Apps.
   + Low CVE-2023-0138: Heap buffer overflow in libphonenumber.
   + Low CVE-2023-0139: Insufficient validation of untrusted input in Downloads.
   + Low CVE-2023-0140: Inappropriate implementation in File System API.
   + Low CVE-2023-0141: Insufficient policy enforcement in CORS.
 - Set provides webclient (closes: #43564)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>