"Fossies" - the Fresh Open Source Software Archive

Member "qt-everywhere-src-6.3.1/qtwebengine/dist/changes-5.12.10" (8 Jun 2022, 3642 Bytes) of package /linux/misc/qt-everywhere-src-6.3.1.tar.xz:


As a special service "Fossies" has tried to format the requested text file into HTML format (style: standard) with prefixed line numbers. Alternatively you can here view or download the uninterpreted source code file.

    1 Qt 5.12.10 is a bug-fix release. It maintains both forward and backward
    2 compatibility (source and binary) with Qt 5.12.9.
    3 
    4 For more details, refer to the online documentation included in this
    5 distribution. The documentation is also available online:
    6 
    7   https://doc.qt.io/qt-5.12/index.html
    8 
    9 The Qt version 5.12 series is binary compatible with the 5.11.x series.
   10 Applications compiled for 5.11 will continue to run with 5.12.
   11 
   12 Some of the changes listed in this file include issue tracking numbers
   13 corresponding to tasks in the Qt Bug Tracker:
   14 
   15   https://bugreports.qt.io/
   16 
   17 Each of these identifiers can be entered in the bug tracker to obtain more
   18 information about a particular change.
   19 
   20 ****************************************************************************
   21 *                          Library                                         *
   22 ****************************************************************************
   23 
   24 General
   25 -------
   26 
   27   - [QTBUG-75391] Fix pasting Unicode characters copied from WebEngine on macOS
   28   - [QTBUG-83710] Fix input of keys requiring AltGr on Windows
   29   - [QTBUG-84337] Fixed GPU switching with CoreProfile on macOS (for e.g. AirPlay)
   30   - [QTBUG-86018] Fixed build with Bison 3.7
   31   - Fixed build with the linux-clang 10 spec
   32 
   33 Chromium
   34 --------
   35 
   36   - Security fixes from Chromium up to version 86.0.4240.111, including:
   37 
   38     - CVE-2020-6459
   39     - CVE-2020-6462: Use after free in task scheduling
   40     - CVE-2020-6470
   41     - CVE-2020-6474
   42     - CVE-2020-6481
   43     - CVE-2020-6489
   44     - CVE-2020-6490
   45     - CVE-2020-6511: Side-channel information leakage in CSP
   46     - CVE-2020-6512: Type Confusion in V8
   47     - CVE-2020-6513: Heap buffer overflow in PDFium
   48     - CVE-2020-6514: Inappropriate implementation in WebRTC
   49     - CVE-2020-6518: Use after free in developer tools
   50     - CVE-2020-6523: Out of bounds write in Skia
   51     - CVE-2020-6524: Heap buffer overflow in WebAudio
   52     - CVE-2020-6529: Inappropriate implementation in WebRTC
   53     - CVE-2020-6532: Use after free in SCTP
   54     - CVE-2020-6535: Insufficient data validation in WebUI
   55     - CVE-2020-6534: Heap buffer overflow in WebRTC
   56     - CVE-2020-6540: Heap buffer overflow in Skia
   57     - CVE-2020-6541: Use after free in WebUSB
   58     - CVE-2020-6542: Use after free in ANGLE
   59     - CVE-2020-6543: Use after free in task scheduling
   60     - CVE-2020-6544: Use after free in media
   61     - CVE-2020-6545: Use after free in audio
   62     - CVE-2020-6548: Heap buffer overflow in Skia
   63     - CVE-2020-6549: Use after free in media
   64     - CVE-2020-6559: Use after free in presentation API
   65     - CVE-2020-6561: Inappropriate implementation in Content Security Policy
   66     - CVE-2020-6562: Insufficient policy enforcement in Blink
   67     - CVE-2020-6569: Integer overflow in WebUSB
   68     - CVE-2020-6571: Incorrect security UI in Omnibox
   69     - CVE-2020-6573: Use after free in video
   70     - CVE-2020-15962: Insufficient policy enforcement in serial
   71     - CVE-2020-15964: Insufficient data validation in media
   72     - CVE-2020-15965: Out of bounds write in V8
   73     - CVE-2020-15968: Use after free in Blink
   74     - CVE-2020-15969: Use after free in WebRTC.
   75     - CVE-2020-15999: Heap buffer overflow in freetype
   76     - CVE-2020-16001: Use after free in media.
   77     - CVE-2020-16002: Use after free in PDFium.
   78     - CVE-2020-16003: Use after free in printing.
   79     - Security Bug 1051439
   80     - Security bug 1052492
   81     - Security bug 1054229
   82     - Security Bug 1057369
   83     - Security Bug 1058515
   84     - Security bug 1065122
   85     - Security bug 1065731
   86     - Security bugs 1087629 and 1029569
   87     - Security issue 1098860
   88     - Security issue 1102137
   89     - Security bug 1102408
   90     - Security bug 1111149
   91