exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 28999

Secunia Security Advisory 28999
Posted Feb 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | c09f5b7615b0416da591d4cb247e7b6c2eea6fe5f5fe4ddb4cfa7c104b3fce14

Secunia Security Advisory 28999

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
Ubuntu update for qt

SECUNIA ADVISORY ID:
SA28999

VERIFY ADVISORY:
http://secunia.com/advisories/28999/

CRITICAL:
Less critical

IMPACT:
Security Bypass, Spoofing

WHERE:
>From remote

OPERATING SYSTEM:
Ubuntu Linux 7.10
http://secunia.com/product/16251/

DESCRIPTION:
Ubuntu has issued an update for qt. This fixes a vulnerability, which
can be exploited by malicious people to bypass certain security
restrictions.

For more information:
SA28228

SOLUTION:
Apply updated packages.

-- Ubuntu 7.10 --

Source archives:

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2-0ubuntu3.2.diff.gz
Size/MD5: 50784 34e258b7ef8ddb98baff43b8addda445
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2-0ubuntu3.2.dsc
Size/MD5: 1605 13abaddb49b3db3c5c30e9f9f04de057
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2.orig.tar.gz
Size/MD5: 43462686 a60490b36099bdd10c4d2f55430075b3

Architecture independent packages:

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc_4.3.2-0ubuntu3.2_all.deb
Size/MD5: 25346480 99cd0e2b1094ed55284db1d58605d079

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 1943082 b4e65e7adebc86ba9b6cc871a60bbd0e
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 81469132 14a6f12efd943643de8dad9c0e34f339
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 4803626 e72bbf5adf05487893c14820191aa485
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 5395948 c66f7f37b88c2f153bd2fde0f5f949a8
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 1140384 4f2364042868f3c780e26fd80b40919a
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 154934 8fa24a2d0efe9bd826d20e79e26de0de
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 1295424 435d9d6947a1becd34602c9b68a48176
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 769864 652ecbdfe495cc23e4cf160cca21d36d
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_amd64.deb
Size/MD5: 99416 8868ca06f4ee62152de3cc4b9b426b80

i386 architecture (x86 compatible Intel/AMD):

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 1768524 131d6c2c0551f2398fce9ff082b37ef2
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 81026292 8ebfec68d6e0955a3e0a5e1e476a5b55
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 4437758 222c08edb1bfc0785ed467a5e5ce83a8
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 4887460 434b7dbebf234ff398e0fe33e8fcc486
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 1021026 db8cb6acd0537582fc6ff4012e359555
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 138812 4492b7b101fbf43cd914a7085c8c5481
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 1249678 1e65a2dcc55131b96f793b69a56eeb08
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 699468 9f2a65ffc4dac8f019bcdadba7571d9c
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_i386.deb
Size/MD5: 93364 db90b49be856de532888e68d3bbe402b

powerpc architecture (Apple Macintosh G3/G4/G5):

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 1861838 4ad11d44b4208bb7a5a2519a02de72fc
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 82142134 aa5b06c09de5c25944ad9b98f5dcb676
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 4567070 25ffc9fc0c49e5d7530559489a2d35c0
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 5197272 6a3d9fb41efa29c7f8b9704d06a5f3dc
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 1080292 189dafc8eadebe3d9805baf6d89b6fa7
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 148286 06074830da4f808d783fbbbb74790fab
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 1301788 ce0c43cbc94828802e56fbe5ac2b7915
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 736666 89d70c039b28804dc839c59bca89391e
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_powerpc.deb
Size/MD5: 99296 5d0f324237c2917dfedd321e9609d91f

sparc architecture (Sun SPARC/UltraSPARC):

http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 1995356 dd817644c167ae96d89cf18a6cbb6ce0
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 81693916 71f54e309969dad838e11744967e8456
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 4901052 fe9616d0a0e887c755c9a1e377b67369
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 5446702 dcb34afd768d848994abb5a957c1fab9
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 1095232 c1f10a9b14875556be4e58a8a4929920
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 149300 9a1f86ef66138ebc1e795b3e861599af
http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 1307846 98d9129d15fb7c2869c12e5e5350f442
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 749918 7d01faab0bcc71e048d05f4084f6200c
http://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_sparc.deb
Size/MD5: 97246 018bdbaf72fba8492ab75360da84face

ORIGINAL ADVISORY:
http://www.ubuntu.com/usn/usn-579-1

OTHER REFERENCES:
SA28228:
http://secunia.com/advisories/28228/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close