![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.833004 |
Category: | SuSE Local Security Checks |
Title: | openSUSE: Security Advisory for libqt5 (openSUSE-SU-2022:10049-1) |
Summary: | The remote host is missing an update for the 'libqt5'; package(s) announced via the openSUSE-SU-2022:10049-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'libqt5' package(s) announced via the openSUSE-SU-2022:10049-1 advisory. Vulnerability Insight: This update for libqt5-qtwebengine fixes the following issues: Update to version 5.15.10: * Fix top level build with no widget * Fix read-after-free on EGL extensions * Update Chromium * Add workaround for unstable gn on macOS in ci * Pass archiver to gn build * Fix navigation to non-local URLs * Add support for universal builds for qtwebengine and qtpdf * Enable Apple Silicon support * Fix cross compilation x86_64- arm64 on mac * Bump version to 5.15.10 * CustomDialogs: Make custom input fields readable in dark mode * CookieBrowser: Make alternating rows readable in dark mode * Update Chromium: * Bump V8_PATCH_LEVEL * Fix clang set-but-unused-variable warning * Fix mac toolchain python linker script call * Fix missing dependency for gpu sources * Fix python calls * Fix undefined symbol for universal link * Quick fix for regression in service workers by reverting backports * [Backport] CVE-2022-0797: Out of bounds memory access in Mojo * [Backport] CVE-2022-1125 * [Backport] CVE-2022-1138: Inappropriate implementation in Web Cursor. * [Backport] CVE-2022-1305: Use after free in storage * [Backport] CVE-2022-1310: Use after free in regular expressions * [Backport] CVE-2022-1314: Type Confusion in V8 * [Backport] CVE-2022-1493: Use after free in Dev Tools * [Backport] On arm64 hosts, set host_cpu to 'arm64', not 'arm' * [Backport] Security Bug 1296876 * [Backport] Security bug 1269999 * [Backport] Security bug 1280852 * [Backport] Security bug 1292905 * [Backport] Security bug 1304659 * [Backport] Security bug 1306507 Affected Software/OS: 'libqt5' package(s) on openSUSE Backports SLE-15-SP4. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-0797 https://security.gentoo.org/glsa/202208-25 https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html https://crbug.com/1281908 Common Vulnerability Exposure (CVE) ID: CVE-2022-1125 https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop_29.html https://crbug.com/1292261 Common Vulnerability Exposure (CVE) ID: CVE-2022-1138 https://crbug.com/1246188 Common Vulnerability Exposure (CVE) ID: CVE-2022-1305 https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_11.html https://crbug.com/1285234 Common Vulnerability Exposure (CVE) ID: CVE-2022-1310 https://crbug.com/1307610 Common Vulnerability Exposure (CVE) ID: CVE-2022-1314 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-1314 https://crbug.com/1304658 Common Vulnerability Exposure (CVE) ID: CVE-2022-1493 https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html https://crbug.com/1275414 |
Copyright | Copyright (C) 2024 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |