USN-2057-1: Qt vulnerability

Publication date

17 December 2013

Overview

Qt could be made to consume resources and hang if it processed XML data.


Packages

Details

It was discovered that QXmlSimpleReader in Qt incorrectly handled XML
entity expansion. An attacker could use this flaw to cause Qt applications
to consume large amounts of resources, resulting in a denial of service.

It was discovered that QXmlSimpleReader in Qt incorrectly handled XML
entity expansion. An attacker could use this flaw to cause Qt applications
to consume large amounts of resources, resulting in a denial of service.

Update instructions

After a standard system update you need to restart your session to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
13.10 saucy libqt4-xml –  4:4.8.4+dfsg-0ubuntu18.1
libqt5xml5 –  5.0.2+dfsg1-7ubuntu11.1
13.04 raring libqt4-xml –  4:4.8.4+dfsg-0ubuntu9.5
libqt5xml5 –  5.0.1+dfsg-0ubuntu4.1
12.10 quantal libqt4-xml –  4:4.8.3+dfsg-0ubuntu3.2
12.04 precise libqt4-xml –  4:4.8.1-0ubuntu4.5

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›