---------------------------------------------------------------------- Want to work within IT-Security? Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit. Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: SUSE update for Qt SECUNIA ADVISORY ID: SA22397 VERIFY ADVISORY: http://secunia.com/advisories/22397/ CRITICAL: Moderately critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: SUSE Linux 10.1 http://secunia.com/product/10796/ UnitedLinux 1.0 http://secunia.com/product/2003/ SuSE Linux Standard Server 8 http://secunia.com/product/2526/ SuSE Linux Openexchange Server 4.x http://secunia.com/product/2001/ SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SUSE Linux 9.3 http://secunia.com/product/4933/ SUSE Linux 9.2 http://secunia.com/product/4258/ SUSE Linux 10 http://secunia.com/product/6221/ SOFTWARE: Novell Open Enterprise Server http://secunia.com/product/4664/ DESCRIPTION: SUSE has issued an update for Qt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library. For more information: SA22380 SOLUTION: Apply updated packages. x86 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt-4.1.0-29.7.i586.rpm e12c52bc945edd9e628d6df1e13de2d6 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt3-3.3.5-58.12.i586.rpm abe3bbbee7a4b4af9cb58bda71936c00 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt3-static-3.3.5-58.11.i586.rpm 1937b5e2a6c8757cccca93ffb1408d5e SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt-4.0.1-10.2.i586.rpm 05c82cfb84d3b54d886892a4dc63e1ec ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt3-3.3.4-28.7.i586.rpm 6f63526c70fe7d73080dc2de5fa11fe3 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt3-static-3.3.4-28.7.i586.rpm 18d16343cf35a8bb0330bb762bbf808e SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/qt3-3.3.4-11.5.i586.rpm e169e5ee6b884b7998fa518defb6f20f ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/i586/qt3-static-3.3.4-11.4.i586.rpm 014dbf4e04cd37441bf1cba412c84fef SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/qt3-3.3.3-24.2.i586.rpm efe3a67ba78ae5b23310798d00ee14db ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/i586/qt3-static-3.3.3-24.2.i586.rpm 249c9c5e985b87d2f0bd2601e2c6eed6 Power PC Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt-4.1.0-29.7.ppc.rpm 9c3c01f4943dfeede555f79365d1d95d ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt3-3.3.5-58.12.ppc.rpm 91dd8f28532d3367e5d6f8884df28530 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt3-static-3.3.5-58.11.ppc.rpm ae42fa85b6e38ba036bdbe8e77f557dd SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt-4.0.1-10.2.ppc.rpm ab54cd200e6b1486b156f2cf70156314 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt3-3.3.4-28.7.ppc.rpm 833fdad7ce3b3e9bffaa3e4a65910195 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt3-static-3.3.4-28.7.ppc.rpm c42c042e858cc6cc435d977ae5a4c065 x86-64 Platform: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt-32bit-4.1.0-29.7.x86_64.rpm 711209a60be530a8562e54816e609a33 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt-4.1.0-29.7.x86_64.rpm 7ba57673efe68da9bf0004f842315ada ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-3.3.5-58.12.x86_64.rpm 24cb3dcbb9c92943017f0e5ea401ada8 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-32bit-3.3.5-58.12.x86_64.rpm ea46d71c833c20f18085496eace559f7 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-static-3.3.5-58.11.x86_64.rpm 44c17f12db82e58bbf4b457eb6b66df6 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt-4.0.1-10.2.x86_64.rpm 6c1ec2a6f0a109e749f7b534408b3b66 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-3.3.4-28.7.x86_64.rpm aa0bbb971bb63d4e18a7f0e4464aa0c2 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-32bit-3.3.4-28.7.x86_64.rpm 3b3936a24b424bc7d516095a2e431d70 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-static-3.3.4-28.7.x86_64.rpm 0fc0adb3a0bbb3aa49b6e6985f42565f SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/qt3-3.3.4-11.5.x86_64.rpm 46597f7dfa33b4420c6f09c93e89aa78 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/qt3-32bit-9.3-7.2.x86_64.rpm 36b4efe799155111618a9cd325f20bc6 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/x86_64/qt3-static-3.3.4-11.4.x86_64.rpm c237b330e43606562a4b918077257559 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/qt3-3.3.3-24.2.x86_64.rpm 912f789b47bfe446185bccd0455f9455 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/qt3-32bit-9.2-200610231734.x86_64.rpm f87ba1142036ff3f31d7566a99d9e74a ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/x86_64/qt3-static-3.3.3-24.2.x86_64.rpm 4abfb7a5ba2254595b04896ee34695b6 Sources: SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/qt-4.1.0-29.7.src.rpm 6330e726a2200327e311fd04ca1826f1 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/qt3-3.3.5-58.12.src.rpm 57ed729399ac1296be632b7dbd3be636 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/qt3-static-3.3.5-58.11.src.rpm 03fd50682d7fc2bbc598bdcd09f87006 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/qt-4.0.1-10.2.src.rpm be60f21b5cec25fdb0ad3ba7726a6704 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/qt3-3.3.4-28.7.src.rpm cd76c0551e1c66be5f1949621f3e88b4 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/qt3-static-3.3.4-28.7.src.rpm d0479a8b6ac835b72faaa233647c3501 SUSE LINUX 9.3: ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/qt3-3.3.4-11.5.src.rpm 25b4693967b6078f809ec457ac126cf2 ftp://ftp.suse.com/pub/suse/i386/update/9.3/rpm/src/qt3-static-3.3.4-11.4.src.rpm 6d2c6d1bf4ed434cfc1438e8c49b2a06 SUSE LINUX 9.2: ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/qt3-3.3.3-24.2.src.rpm 5c828039b8775b31a61fcc550bb74020 ftp://ftp.suse.com/pub/suse/i386/update/9.2/rpm/src/qt3-static-3.3.3-24.2.src.rpm 15bdf0fac96eabc026079fd95ee24ede SUSE SLED 10 http://support.novell.com/techcenter/psdb/f8c39f5569987d0d73366502b34c3a3c.html SUSE SLES 10 http://support.novell.com/techcenter/psdb/f8c39f5569987d0d73366502b34c3a3c.html http://support.novell.com/techcenter/psdb/115cf76bac71f3f0e647b820d43ea9ed.html Open Enterprise Server http://support.novell.com/techcenter/psdb/595ed8e88dd0e76ba4d62c4bb475e623.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/595ed8e88dd0e76ba4d62c4bb475e623.html UnitedLinux 1.0 http://support.novell.com/techcenter/psdb/658959fe28d2fe434c2f5b9153eca1db.html SuSE Linux Openexchange Server 4 http://support.novell.com/techcenter/psdb/658959fe28d2fe434c2f5b9153eca1db.html SuSE Linux Enterprise Server 8 http://support.novell.com/techcenter/psdb/658959fe28d2fe434c2f5b9153eca1db.html SuSE Linux Standard Server 8 http://support.novell.com/techcenter/psdb/658959fe28d2fe434c2f5b9153eca1db.html SuSE Linux Desktop 1.0 http://support.novell.com/techcenter/psdb/658959fe28d2fe434c2f5b9153eca1db.html ORIGINAL ADVISORY: http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html OTHER REFERENCES: SA22380: http://secunia.com/advisories/22380/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------