USN-2626-1: Qt vulnerabilities
Ubuntu Security Notice USN-2626-1
3rd June, 2015
qt4-x11, qtbase-opensource-src vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Qt could be made to crash or run programs as your login if it opened a specially crafted file.
Software description
- qt4-x11 - Qt 4 libraries
- qtbase-opensource-src - Qt 5 libraries
Details
Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)
Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)
Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 15.04:
- libqtgui4 4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
- libqt5gui5 5.4.1+dfsg-2ubuntu4.1
- Ubuntu 14.10:
- libqtgui4 4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
- libqt5gui5 5.3.0+dfsg-2ubuntu9.1
- Ubuntu 14.04 LTS:
- libqtgui4 4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
- libqt5gui5 5.2.1+dfsg-1ubuntu14.3
- Ubuntu 12.04 LTS:
- libqtgui4 4:4.8.1-0ubuntu4.9
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to restart your session to make
all the necessary changes.
References
CVE-2014-0190, CVE-2015-0295, CVE-2015-1858, CVE-2015-1859, CVE-2015-1860
from Ubuntu Security Notices http://ift.tt/1FubmhY