Fwd: [USN-2626-1] Qt vulnerabilities
Florian Bruhin
me at the-compiler.org
Wed Jun 3 16:42:29 CEST 2015
Hi,
I'm actually amazed Ubuntu managed to take so long to backport those
packages... IIRC, Debian, Arch (and maybe others) had already applied
them for a while.
The first issue is from April 2014... Gah. (Though that one seems to
apply to Qt 4 only)
So if you're on Ubuntu, please update (or, you know, don't use
Ubuntu).
Florian
----- Forwarded message from Marc Deslauriers <marc.deslauriers at canonical.com> -----
==========================================================================
Ubuntu Security Notice USN-2626-1
June 03, 2015
qt4-x11, qtbase-opensource-src vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary:
Qt could be made to crash or run programs as your login if it opened a
specially crafted file.
Software Description:
- qt4-x11: Qt 4 libraries
- qtbase-opensource-src: Qt 5 libraries
Details:
Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)
Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
libqt5gui5 5.4.1+dfsg-2ubuntu4.1
libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
Ubuntu 14.10:
libqt5gui5 5.3.0+dfsg-2ubuntu9.1
libqtgui4 4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
Ubuntu 14.04 LTS:
libqt5gui5 5.2.1+dfsg-1ubuntu14.3
libqtgui4 4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
Ubuntu 12.04 LTS:
libqtgui4 4:4.8.1-0ubuntu4.9
After a standard system update you need to restart your session to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2626-1
CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859,
CVE-2015-1860
Package Information:
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.4.1+dfsg-2ubuntu4.1
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.3.0+dfsg-2ubuntu9.1
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.2.1+dfsg-1ubuntu14.3
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.1-0ubuntu4.9
--
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
----- End forwarded message -----
--
http://www.the-compiler.org | me at the-compiler.org (Mail/XMPP)
GPG: 916E B0C8 FD55 A072 | http://the-compiler.org/pubkey.asc
I love long mails! | http://email.is-not-s.ms/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://listi.jpberlin.de/pipermail/qutebrowser/attachments/20150603/d6aadf2f/attachment.sig>
More information about the qutebrowser
mailing list