Ubuntu: Qt vulnerability

    Date 21 Feb 2008
    4043
    Posted By LinuxSecurity Advisories
    It was discovered that QSslSocket did not properly verify SSL certificates. A remote attacker may be able to trick applications using QSslSocket into accepting invalid SSL certificates.
    =========================================================== 
    Ubuntu Security Notice USN-579-1          February 20, 2008
    qt4-x11 vulnerability
    CVE-2007-5965
    ===========================================================
    
    A security issue affects the following Ubuntu releases:
    
    Ubuntu 7.10
    
    This advisory also applies to the corresponding versions of
    Kubuntu, Edubuntu, and Xubuntu.
    
    The problem can be corrected by upgrading your system to the
    following package versions:
    
    Ubuntu 7.10:
      libqt4-core                     4.3.2-0ubuntu3.2
    
    After a standard system upgrade you need to restart applications
    linked against Qt to effect the necessary changes.
    
    Details follow:
    
    It was discovered that QSslSocket did not properly verify SSL
    certificates. A remote attacker may be able to trick applications
    using QSslSocket into accepting invalid SSL certificates.
    
    
    Updated packages for Ubuntu 7.10:
    
      Source archives:
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2-0ubuntu3.2.diff.gz
          Size/MD5:    50784 34e258b7ef8ddb98baff43b8addda445
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2-0ubuntu3.2.dsc
          Size/MD5:     1605 13abaddb49b3db3c5c30e9f9f04de057
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.3.2.orig.tar.gz
          Size/MD5: 43462686 a60490b36099bdd10c4d2f55430075b3
    
      Architecture independent packages:
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc_4.3.2-0ubuntu3.2_all.deb
          Size/MD5: 25346480 99cd0e2b1094ed55284db1d58605d079
    
      amd64 architecture (Athlon64, Opteron, EM64T Xeon):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:  1943082 b4e65e7adebc86ba9b6cc871a60bbd0e
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5: 81469132 14a6f12efd943643de8dad9c0e34f339
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:  4803626 e72bbf5adf05487893c14820191aa485
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:  5395948 c66f7f37b88c2f153bd2fde0f5f949a8
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:  1140384 4f2364042868f3c780e26fd80b40919a
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:   154934 8fa24a2d0efe9bd826d20e79e26de0de
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:  1295424 435d9d6947a1becd34602c9b68a48176
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:   769864 652ecbdfe495cc23e4cf160cca21d36d
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_amd64.deb
          Size/MD5:    99416 8868ca06f4ee62152de3cc4b9b426b80
    
      i386 architecture (x86 compatible Intel/AMD):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:  1768524 131d6c2c0551f2398fce9ff082b37ef2
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5: 81026292 8ebfec68d6e0955a3e0a5e1e476a5b55
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:  4437758 222c08edb1bfc0785ed467a5e5ce83a8
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:  4887460 434b7dbebf234ff398e0fe33e8fcc486
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:  1021026 db8cb6acd0537582fc6ff4012e359555
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:   138812 4492b7b101fbf43cd914a7085c8c5481
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:  1249678 1e65a2dcc55131b96f793b69a56eeb08
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:   699468 9f2a65ffc4dac8f019bcdadba7571d9c
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_i386.deb
          Size/MD5:    93364 db90b49be856de532888e68d3bbe402b
    
      powerpc architecture (Apple Macintosh G3/G4/G5):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:  1861838 4ad11d44b4208bb7a5a2519a02de72fc
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5: 82142134 aa5b06c09de5c25944ad9b98f5dcb676
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:  4567070 25ffc9fc0c49e5d7530559489a2d35c0
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:  5197272 6a3d9fb41efa29c7f8b9704d06a5f3dc
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:  1080292 189dafc8eadebe3d9805baf6d89b6fa7
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:   148286 06074830da4f808d783fbbbb74790fab
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:  1301788 ce0c43cbc94828802e56fbe5ac2b7915
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:   736666 89d70c039b28804dc839c59bca89391e
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_powerpc.deb
          Size/MD5:    99296 5d0f324237c2917dfedd321e9609d91f
    
      sparc architecture (Sun SPARC/UltraSPARC):
    
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:  1995356 dd817644c167ae96d89cf18a6cbb6ce0
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-debug_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5: 81693916 71f54e309969dad838e11744967e8456
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:  4901052 fe9616d0a0e887c755c9a1e377b67369
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:  5446702 dcb34afd768d848994abb5a957c1fab9
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:  1095232 c1f10a9b14875556be4e58a8a4929920
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:   149300 9a1f86ef66138ebc1e795b3e861599af
        https://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:  1307846 98d9129d15fb7c2869c12e5e5350f442
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-dev-tools_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:   749918 7d01faab0bcc71e048d05f4084f6200c
        https://security.ubuntu.com/ubuntu/pool/universe/q/qt4-x11/qt4-qtconfig_4.3.2-0ubuntu3.2_sparc.deb
          Size/MD5:    97246 018bdbaf72fba8492ab75360da84face
    
    
    
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"14","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"121","title":"No ","votes":"10","type":"x","order":"2","pct":41.67,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.