[SECURITY] [DLA 2377-1] qt4-x11 security update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2377-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Adrian Bunk
September 21, 2020 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------
Package : qt4-x11
Version : 4:4.8.7+dfsg-11+deb9u1
CVE ID : CVE-2018-15518 CVE-2018-19869 CVE-2018-19870 CVE-2018-19871
CVE-2018-19872 CVE-2018-19873 CVE-2020-17507
Debian Bug : 923003 970308
Several vulnerabilities were fixed in qt4-x11, the legacy version
of the Qt toolkit.
CVE-2018-15518
Double-free or corruption in QXmlStreamReader during parsing of a
specially crafted illegal XML document.
CVE-2018-19869
A malformed SVG image causes a segmentation fault.
CVE-2018-19870
A malformed GIF image causes a NULL pointer dereference in
QGifHandler resulting in a segmentation fault.
CVE-2018-19871
Uncontrolled Resource Consumption in QTgaFile.
CVE-2018-19872
A malformed PPM image causes a crash.
CVE-2018-19873
QBmpHandler segfault on malformed BMP file.
CVE-2020-17507
Buffer over-read in the XBM parser.
For Debian 9 stretch, these problems have been fixed in version
4:4.8.7+dfsg-11+deb9u1.
We recommend that you upgrade your qt4-x11 packages.
For the detailed security status of qt4-x11 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qt4-x11
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----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=PFf3
-----END PGP SIGNATURE-----
Reply to: