Qt may load shared libraries from an untrusted, world-writable directory, resulting in the execution of arbitrary code.
Package | x11-libs/qt on all architectures |
---|---|
Affected versions | < 3.3.4-r2 |
Unaffected versions | >= 3.3.4-r2 |
Qt is a cross-platform GUI toolkit used by KDE.
Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that Qt searches for shared libraries in an untrusted, world-writable directory.
A local attacker could create a malicious shared object that would be loaded by Qt, resulting in the execution of arbitrary code with the privileges of the Qt application.
There is no known workaround at this time.
All Qt users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r2"
Release date
March 01, 2005
Latest revision
May 22, 2006: 02
Severity
normal
Exploitable
local
Bugzilla entries