drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in qt3
Name: |
Pufferüberläufe in qt3
|
|
ID: |
SSA:2004-236-01 |
|
Distribution: |
Slackware |
|
Plattformen: |
Slackware -current, Slackware 9.0, Slackware 9.1, Slackware 10.0 |
|
Datum: |
Di, 24. August 2004, 13:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0691
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0692
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0693 |
|
Applikationen: |
Qt |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
[slackware-security] Qt (SSA:2004-236-01)
New Qt packages are available for Slackware 9.0, 9.1, 10.0, and -current to fix security issues. Bugs in the routines that handle PNG, BMP, GIF, and JPEG images may allow an attacker to cause unauthorized code to execute when a specially crafted image file is processed. These flaws may also cause crashes that lead to a denial of service.
More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693
Here are the details from the Slackware 10.0 ChangeLog: +--------------------------+ Mon Aug 23 12:12:58 PDT 2004 patches/packages/qt-3.3.3-i486-1.tgz: Upgraded to qt-3.3.3. This fixes bugs in the image loading routines which could be used by an attacker to run unauthorized code or create a denial-of-service. For more details, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0691 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0692 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0693 (* Security fix *) +--------------------------+
Where to find the new packages: +-----------------------------+
Updated package for Slackware 9.0: qt-3.1.2-i486-4.tgz
Updated package for Slackware 9.1: qt-3.2.1-i486-2.tgz
Updated package for Slackware 10.0: qt-3.3.3-i486-1.tgz
Updated package for Slackware -current: qt-3.3.3-i486-1.tgz
MD5 signatures: +-------------+
Slackware 9.0 package: 1c08c5c4565bc9705c77c68158b243ff qt-3.1.2-i486-4.tgz
Slackware 9.1 package: 0ac3036c617f3236d868524d7b04c9ac qt-3.2.1-i486-2.tgz
Slackware 10.0 package: 58f31da25d9e03b6d00bda1402c361ef qt-3.3.3-i486-1.tgz
Slackware -current package: 58f31da25d9e03b6d00bda1402c361ef qt-3.3.3-i486-1.tgz
Installation instructions: +------------------------+
Upgrade the package as root: # upgradepkg qt-3.3.3-i486-1.tgz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFBKmKmakRjwEAQIjMRAhmOAJ9j1p+YJGrJTfHTeDa1HoNX7i7/wwCfUbYp lvBrSwNQB4OtzGjbOxeW4C0= =WALn -----END PGP SIGNATURE-----
|
|
|
|