GLSA 202312-07: QtWebEngine: Multiple Vulnerabilities
Severity: | high |
Title: | QtWebEngine: Multiple Vulnerabilities |
Date: | 12/22/2023 |
Bugs: |
|
ID: | 202312-07 |
Synopsis
Multiple vulnerabilitiies have been discovered in QtWebEngine, the worst of which could lead to remote code execution.Background
QtWebEngine is a library for rendering dynamic web content in Qt5 and Qt6 C++ and QML applications.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
dev-qt/qtwebengine | < 5.15.11_p20231120 | >= 5.15.11_p20231120 | All supported architectures |
Description
Multiple vulnerabilities have been discovered in QtWebEngine. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All QtWebEngine users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.11_p20231120"
References
CVE-2023-6112 CVE-2023-5997 CVE-2023-5996 CVE-2023-5859 CVE-2023-5858 CVE-2023-5857 CVE-2023-5856 CVE-2023-5855 CVE-2023-5854 CVE-2023-5853 CVE-2023-5852 CVE-2023-5851 CVE-2023-5850 CVE-2023-5849 CVE-2023-5487 CVE-2023-5486 CVE-2023-5485 CVE-2023-5484 CVE-2023-5483 CVE-2023-5482 CVE-2023-5481 CVE-2023-5480 CVE-2023-5479 CVE-2023-5478 CVE-2023-5477 CVE-2023-5476 CVE-2023-5475 CVE-2023-5474 CVE-2023-5473 CVE-2023-5218 CVE-2023-4764 CVE-2023-4763 CVE-2023-4762 CVE-2023-4761 CVE-2023-4078 CVE-2023-4077 CVE-2023-4076 CVE-2023-4075 CVE-2023-4074 CVE-2023-4073 CVE-2023-4072 CVE-2023-4071 CVE-2023-4070 CVE-2023-4069 CVE-2023-4068
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.