blob: 6206cd3f05ac22a640be75ceee72cb1463d36cba [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200712-08">
<title>AMD64 x86 emulation Qt library: Multiple vulnerabilities</title>
Multiple vulnerabilities in the AMD64 x86 emulation Qt library may lead to
the remote execution of arbitrary code in Qt applications.
<product type="ebuild">emul-linux-x86-qtlibs</product>
<announced>December 09, 2007</announced>
<revised>December 09, 2007: 01</revised>
<package name="app-emulation/emul-linux-x86-qtlibs" auto="yes" arch="amd64">
<unaffected range="ge">20071114-r2</unaffected>
<vulnerable range="lt">20071114-r2</vulnerable>
Qt is a cross-platform GUI framework, which is used e.g. by KDE. The
AMD64 x86 emulation Qt library packages Qt libraries for 32bit x86
emulation on AMD64.
The Qt versions used by the AMD64 x86 emulation Qt libraries were
vulnerable to several flaws (GLSA 200708-16, GLSA 200710-28)
<impact type="normal">
An attacker could trigger one of the vulnerabilities by causing a Qt
application to parse specially crafted text or Unicode strings, which
may lead to the execution of arbitrary code with the privileges of the
user running the application.
There is no known workaround at this time.
All AMD64 x86 emulation Qt library users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=app-emulation/emul-linux-x86-qtlibs-20071114-r2&quot;</code>
<uri link="/security/en/glsa/glsa-200708-16.xml">GLSA 200708-16</uri>
<uri link="/security/en/glsa/glsa-200710-28.xml">GLSA 200710-28</uri>
<metadata tag="requester" timestamp="Sun, 02 Dec 2007 12:28:12 +0000">
<metadata tag="submitter" timestamp="Sun, 09 Dec 2007 19:55:14 +0000">
<metadata tag="bugReady" timestamp="Sun, 09 Dec 2007 20:04:39 +0000">