Qt: Multiple format string vulnerabilities — GLSA 200708-16

Format string vulnerabilities in Qt 3 may lead to the remote execution of arbitrary code in some Qt applications.

Affected packages

x11-libs/qt on all architectures
Affected versions < 3.3.8-r3
Unaffected versions >= 3.3.8-r3

Background

Qt is a cross-platform GUI framework, which is used e.g. by KDE.

Description

Tim Brown of Portcullis Computer Security Ltd and Dirk Mueller of KDE reported multiple format string errors in qWarning() calls in files qtextedit.cpp, qdatatable.cpp, qsqldatabase.cpp, qsqlindex.cpp, qsqlrecord.cpp, qglobal.cpp, and qsvgdevice.cpp.

Impact

An attacker could trigger one of the vulnerabilities by causing a Qt application to parse specially crafted text, which may lead to the execution of arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All Qt 3 users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose "=x11-libs/qt-3*"

References

Release date
August 22, 2007

Latest revision
August 22, 2007: 01

Severity
normal

Exploitable
remote, local

Bugzilla entries