You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
gentoo-overlay/metadata/glsa/glsa-201603-10.xml

65 lines
2.3 KiB

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201603-10">
<title>QtGui: Multiple vulnerabilities </title>
<synopsis>Multiple vulnerabilities have been found in QtGui allowing remote
attackers to execute arbitrary code or cause Denial of Service.
</synopsis>
<product type="ebuild"/>
<announced>2016-03-12</announced>
<revised count="2">2016-03-12</revised>
<bug>546174</bug>
<access>remote</access>
<affected>
<package name="dev-qt/qtgui" auto="yes" arch="*">
<unaffected range="ge">5.4.1-r1</unaffected>
<unaffected range="rge">4.8.6-r4</unaffected>
<unaffected range="rge">4.8.7</unaffected>
<vulnerable range="lt">5.4.1-r1</vulnerable>
</package>
</affected>
<background>
<p>QtGui is the GUI module and platform plugins for the Qt framework</p>
</background>
<description>
<p>Multiple buffer overflow vulnerabilities have been discovered in QtGui.
It is possible for remote attackers to construct specially crafted BMP,
ICO, or GIF images that lead to buffer overflows. After successfully
overflowing the buffer the remote attacker can then cause a Denial of
Service or execute arbitrary code.
</p>
</description>
<impact type="normal">
<p>A remote attacker could possibly execute arbitrary code or cause Denial
of Service.
</p>
</impact>
<workaround>
<p>There is no known work around at this time.</p>
</workaround>
<resolution>
<p>All QtGui 4.8 users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-qt/qtgui-4.8.6-r4"
</code>
<p>All QtGui 5.4 users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-qt/qtgui-5.4.1-r1"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1858">CVE-2015-1858</uri>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1859">CVE-2015-1859</uri>
<uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1860">CVE-2015-1860</uri>
</references>
<metadata tag="requester" timestamp="2015-12-31T05:00:23Z">
BlueKnight
</metadata>
<metadata tag="submitter" timestamp="2016-03-12T12:25:16Z">b-man</metadata>
</glsa>