exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28321

Secunia Security Advisory 28321
Posted Jan 4, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 506236ad2199588afb680c384298015f2aefcd9dc007584c87a93df51b429405

Secunia Security Advisory 28321

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Fedora update for qt

SECUNIA ADVISORY ID:
SA28321

VERIFY ADVISORY:
http://secunia.com/advisories/28321/

CRITICAL:
Less critical

IMPACT:
Security Bypass, Spoofing

WHERE:
>From remote

OPERATING SYSTEM:
Fedora 7
http://secunia.com/product/15552/
Fedora 8
http://secunia.com/product/16769/

DESCRIPTION:
Fedora has issued an update for qt. This fixes a vulnerability, which
can be exploited by malicious people to bypass certain security
restrictions.

For more information:
SA28228

SOLUTION:
Apply updated packages.

-- Fedora 7 --

39debece9d5e38274c33f0b8a3808e8613a3157d qt4-4.3.3-1.fc7.ppc64.rpm
29a229a21695b078c66afce2feae4b9bf2d4c780
qt4-odbc-4.3.3-1.fc7.ppc64.rpm
297fa7b6f0e8a1122ea9c7ba5a735605672eebdc
qt4-devel-4.3.3-1.fc7.ppc64.rpm
43b823c1caba9d414af956de4f26c71cd25cf779
qt4-x11-4.3.3-1.fc7.ppc64.rpm
7c27f8422d57eb2b837f6e81a2bedc7b52c2b637
qt4-mysql-4.3.3-1.fc7.ppc64.rpm
cb5d78c34e4bc1691431163e705667e9a8bff36a
qt4-debuginfo-4.3.3-1.fc7.ppc64.rpm
7d45fe61c4b70a8c1a8250e4dcf2380fdbc59c1d
qt4-postgresql-4.3.3-1.fc7.ppc64.rpm
2e872fd2a6e3e024431354db696650c668e5bf64
qt4-doc-4.3.3-1.fc7.ppc64.rpm
2e9dba00177b3598de078fad836f1af8a159bd8e
qt4-sqlite-4.3.3-1.fc7.ppc64.rpm
158ea42fed12302513c7d87704d2fe3912ef2145 qt4-4.3.3-1.fc7.i386.rpm
46c1cdc11210008c76bc360c6dda741b2d981b35
qt4-devel-4.3.3-1.fc7.i386.rpm
4e4b8cc3da3ef92b4bdc104ec6f51d5f7c123b92
qt4-mysql-4.3.3-1.fc7.i386.rpm
67766e2021d798c8c947078d72b836c1f04969f8
qt4-debuginfo-4.3.3-1.fc7.i386.rpm
8c25c7463116639c45047891d3eec7fd8e0e3c85
qt4-sqlite-4.3.3-1.fc7.i386.rpm
3ef2575e568bc8f74e2b7b9fa56a1dc12e1be072
qt4-x11-4.3.3-1.fc7.i386.rpm
2a6fd1cbaaea2877e4f68e54f5a427f317c77659
qt4-postgresql-4.3.3-1.fc7.i386.rpm
fd1419340fd2f9fe8afa60eaf9c8d60d557658c1
qt4-odbc-4.3.3-1.fc7.i386.rpm
25202b1b25013fed0a14dbbd8efbaa7d695998ec
qt4-doc-4.3.3-1.fc7.i386.rpm
be40a9c4cb4ad08a66091e78ed90b4a78f9007af
qt4-sqlite-4.3.3-1.fc7.x86_64.rpm
e652a064cc6e361dd0246123130dfc4b7e5085d2
qt4-odbc-4.3.3-1.fc7.x86_64.rpm
5d40c470135282852f1e0448e819554820eb3751
qt4-debuginfo-4.3.3-1.fc7.x86_64.rpm
fb34fd3748858b0f54d56a1c49e2d624273ef45e
qt4-postgresql-4.3.3-1.fc7.x86_64.rpm
ca963b359b4e1c15e97b81a95e0e70b0838dff99
qt4-doc-4.3.3-1.fc7.x86_64.rpm
c10da1cbfe5f182f1ee484deaa3eb7aa3f93ac32
qt4-devel-4.3.3-1.fc7.x86_64.rpm
997d6b8674b1eb46a5aa2c6d18ae958cbc27530e
qt4-x11-4.3.3-1.fc7.x86_64.rpm
018341cca9c5991fb379ff11c84f6f23ed824d87
qt4-mysql-4.3.3-1.fc7.x86_64.rpm
b26605395f987658c975021e5626fe236e7c8f55 qt4-4.3.3-1.fc7.x86_64.rpm
36ac60d538f6202da06928216822336696d2f1e9 qt4-4.3.3-1.fc7.ppc.rpm
3fd09f536f99e933a41757a1c4a7a6b3cacd5d36
qt4-postgresql-4.3.3-1.fc7.ppc.rpm
cdc748a8fe3b0fadf4cfc4f8e3db259d451a50f3 qt4-doc-4.3.3-1.fc7.ppc.rpm
064c56899e685aa10bba0b9f7ca121086f98a610
qt4-devel-4.3.3-1.fc7.ppc.rpm
1683c0d7d2fa4aa40d1fe5f20d3738c2982fc637 qt4-x11-4.3.3-1.fc7.ppc.rpm
ad414cc1984c7e42bbd76677152c4dd62d3ec709
qt4-sqlite-4.3.3-1.fc7.ppc.rpm
6d982e6f77c4a294b2bda81eeb377af3bcff9e63
qt4-mysql-4.3.3-1.fc7.ppc.rpm
ddc5e85e823665a2e4451f5ff66c274ce593ddd3
qt4-debuginfo-4.3.3-1.fc7.ppc.rpm
cf889d029ce883043a6f73bbdc4e18c8e08b5f99
qt4-odbc-4.3.3-1.fc7.ppc.rpm
0a93f3a8c85f1ad0d6f3714657a102cac9a4858c qt4-4.3.3-1.fc7.src.rpm

-- Fedora 8 --

3884fd2299c5fa568f3e8c2a844ed1639a226d15 qt4-4.3.3-1.fc8.ppc64.rpm
2e0e53df20e918dbb2c2a5f60f37ed8829add11d
qt4-mysql-4.3.3-1.fc8.ppc64.rpm
c011fd9b26a50a214e7e4877179755a547751266
qt4-odbc-4.3.3-1.fc8.ppc64.rpm
ab3669d9ef36ad10cd0666c55accc27375c753fd
qt4-debuginfo-4.3.3-1.fc8.ppc64.rpm
f7ce3610f9f48d74199a55d4a6b420d998dab0f3
qt4-postgresql-4.3.3-1.fc8.ppc64.rpm
d11c50b3f8f503e7f04bdbccde9a4105052dfcc4
qt4-devel-4.3.3-1.fc8.ppc64.rpm
2f68d1aba04d3e1a61b41739cef8fe491cbf5960
qt4-doc-4.3.3-1.fc8.ppc64.rpm
6f15386adc68a8f4a568db2825423d1382910c8b
qt4-x11-4.3.3-1.fc8.ppc64.rpm
22234305e15514d059bd22973bdf742ba6f87cab
qt4-sqlite-4.3.3-1.fc8.ppc64.rpm
8bf2bbb50db05c3cdd380a9312f18241993ecd94
qt4-odbc-4.3.3-1.fc8.i386.rpm
a888414bbf61158d0892655b64fa648f7e1868fb
qt4-debuginfo-4.3.3-1.fc8.i386.rpm
3d9d6c740edc2c685d277bbfcb6fa4c151c0b4a3
qt4-mysql-4.3.3-1.fc8.i386.rpm
7b935ec34b1c5f4456c87ccd1765d8f34687d31d
qt4-sqlite-4.3.3-1.fc8.i386.rpm
1400565092a9c3ca429575ee87595bd1875d0b73
qt4-devel-4.3.3-1.fc8.i386.rpm
d98786510b38485b61f85ba7c1b5a66d16747b30
qt4-postgresql-4.3.3-1.fc8.i386.rpm
ba5bda4aa86e83b8a5bcd50053d436610e376249
qt4-doc-4.3.3-1.fc8.i386.rpm
cedd5fed70bbc3b9d6be4a27f57593e590794b98 qt4-4.3.3-1.fc8.i386.rpm
52deed472c70190c72f15db8837e1b0bc234b210
qt4-x11-4.3.3-1.fc8.i386.rpm
7e7613a9c7f36b800b5ccc318c9febfeccfe1c89
qt4-mysql-4.3.3-1.fc8.x86_64.rpm
f10cdc330a4f149cd7863a8564d66fa1f1c771f8
qt4-postgresql-4.3.3-1.fc8.x86_64.rpm
cd1aa2af744660ae6a66ba932a6da96aecda5dd8
qt4-odbc-4.3.3-1.fc8.x86_64.rpm
de2d40421916a3fccef989f8b6222300d9ffdc1f qt4-4.3.3-1.fc8.x86_64.rpm
fe124626d8b02ae81faeb326944dfa8e8d2c5016
qt4-sqlite-4.3.3-1.fc8.x86_64.rpm
0e28c5c83ad3af2dc7069457c7635d42099843fd
qt4-devel-4.3.3-1.fc8.x86_64.rpm
8fa71ff911d00706f14fb3daf9587773a87868f2
qt4-doc-4.3.3-1.fc8.x86_64.rpm
c3d61196b5c7cb7313eea6d0d90cba7631faf5a5
qt4-debuginfo-4.3.3-1.fc8.x86_64.rpm
127bbf329b3e8f99cc1d1e909e27feeb35bc9f9f
qt4-x11-4.3.3-1.fc8.x86_64.rpm
440efe0936be65aa1677400105ef8974b18c7b6b qt4-doc-4.3.3-1.fc8.ppc.rpm
02e143d2c7d555a748b09a2307a71c4d517d1136
qt4-sqlite-4.3.3-1.fc8.ppc.rpm
e8b25854cdb226071688b10abdfe70659e1162fe qt4-x11-4.3.3-1.fc8.ppc.rpm
cf55aa9b7ff76b4caa9cf63a416a51745c82c950
qt4-devel-4.3.3-1.fc8.ppc.rpm
f120f693ebf971b80c8ec27c5ccd237a4c9bfd47
qt4-mysql-4.3.3-1.fc8.ppc.rpm
217b4b0e11ebc8794452612139d6c2a933813647
qt4-postgresql-4.3.3-1.fc8.ppc.rpm
85bbb92d2dc1691d5cf1082c7c3688ee2790451a qt4-4.3.3-1.fc8.ppc.rpm
3cb8d0e4cdc1d07ef9df2ccdf3ffcebf7d45b1a5
qt4-odbc-4.3.3-1.fc8.ppc.rpm
c24dea35d0d4d5dc2f747643379cd9cbc1153c97
qt4-debuginfo-4.3.3-1.fc8.ppc.rpm
8fc6e7354d27a114e5eadb9a486dd4368df8c650 qt4-4.3.3-1.fc8.src.rpm

ORIGINAL ADVISORY:
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00131.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00005.html

OTHER REFERENCES:
SA28228:
http://secunia.com/advisories/28228/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    32 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close