You are here
Home > Preporuke > Sigurnosni nedostatak programskih paketa qt4-x11 i qtbase-opensource-src

Sigurnosni nedostatak programskih paketa qt4-x11 i qtbase-opensource-src

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2626-1
June 03, 2015

qt4-x11, qtbase-opensource-src vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 15.04
– Ubuntu 14.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

Qt could be made to crash or run programs as your login if it opened a
specially crafted file.

Software Description:
– qt4-x11: Qt 4 libraries
– qtbase-opensource-src: Qt 5 libraries

Details:

Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)

Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
libqt5gui5 5.4.1+dfsg-2ubuntu4.1
libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1

Ubuntu 14.10:
libqt5gui5 5.3.0+dfsg-2ubuntu9.1
libqtgui4 4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1

Ubuntu 14.04 LTS:
libqt5gui5 5.2.1+dfsg-1ubuntu14.3
libqtgui4 4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1

Ubuntu 12.04 LTS:
libqtgui4 4:4.8.1-0ubuntu4.9

After a standard system update you need to restart your session to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2626-1
CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859,
CVE-2015-1860

Package Information:

https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.4.1+dfsg-2ubuntu4.1

https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.3.0+dfsg-2ubuntu9.1

https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
https://launchpad.net/ubuntu/+source/qtbase-opensource-src/5.2.1+dfsg-1ubuntu14.3
https://launchpad.net/ubuntu/+source/qt4-x11/4:4.8.1-0ubuntu4.9

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=CUfx
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2015-06-0011-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa virtio-win

Otkriven je sigurnosni nedostatak u programskom paketu virtio-win. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje virtualnog računala slanjem posebno oblikovanog IP...

Close