Multiple vulnerabilities have been discovered in QtCore and QtGui, possibly resulting in execution of arbitrary code, Denial of Service, or man-in-the-middle attacks.
Package | dev-qt/qtcore on all architectures |
---|---|
Affected versions | < 4.8.4-r2 |
Unaffected versions | >= 4.8.4-r2 |
Package | dev-qt/qtgui on all architectures |
---|---|
Affected versions | < 4.8.4-r1 |
Unaffected versions | >= 4.8.4-r1 |
The Qt toolkit is a comprehensive C++ application development framework.
Multiple vulnerabilities have been discovered in QtCore and QtGui. Please review the CVE identifiers referenced below for details.
A remote attacker could entice a user to open a specially crafted file with an application linked against QtCore or QtGui, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker might employ a specially crafted certificate to conduct man-in-the-middle attacks on SSL connections.
There is no known workaround at this time.
All QtCore users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-qt/qtcore-4.8.4-r2"
All QtGui users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-qt/qtgui-4.8.4-r1"
Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.