---------------------------------------------------------------------- BETA test the new Secunia Personal Software Inspector! The Secunia PSI detects installed software on your computer and categorises it as either Insecure, End-of-Life, or Up-To-Date. Effectively enabling you to focus your attention on software installations where more secure versions are available from the vendors. Download the free PSI BETA from the Secunia website: https://psi.secunia.com/ ---------------------------------------------------------------------- TITLE: SUSE update for qt3 SECUNIA ADVISORY ID: SA26306 VERIFY ADVISORY: http://secunia.com/advisories/26306/ CRITICAL: Moderately critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: SUSE Linux Enterprise Server 9 http://secunia.com/product/4118/ UnitedLinux 1.0 http://secunia.com/product/2003/ SuSE Linux Standard Server 8 http://secunia.com/product/2526/ SuSE Linux Openexchange Server 4.x http://secunia.com/product/2001/ SuSE Linux Enterprise Server 8 http://secunia.com/product/1171/ SuSE Linux Enterprise Server 7 http://secunia.com/product/1170/ SUSE Linux Enterprise Server 10 http://secunia.com/product/12192/ SuSE Linux Desktop 1.x http://secunia.com/product/2002/ SUSE Linux 10.1 http://secunia.com/product/10796/ SUSE Linux 10 http://secunia.com/product/6221/ openSUSE 10.2 http://secunia.com/product/13375/ SOFTWARE: Novell Open Enterprise Server http://secunia.com/product/4664/ DESCRIPTION: SUSE has issued an update for qt3. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA26298 SOLUTION: Apply updated packages: x86 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/qt3-3.3.7-16.i586.rpm 87f6312ffd388076bb974163d7cf1962 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/qt3-devel-3.3.7-16.i586.rpm 43ebdf4236a0c8cf124f0d52559789c2 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/qt3-static-3.3.7-17.i586.rpm f47f94946fe1ca22f6a30ec810fb9258 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt3-3.3.5-58.29.i586.rpm 2e8f3cebe72117dcffa6fb96fdeefcba ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt3-devel-3.3.5-58.29.i586.rpm 5f233c952b68ba843b3fcb420f3ddbe9 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/qt3-static-3.3.5-58.23.i586.rpm bae867d513ec83499b4ffbd4bb845f1d SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt3-3.3.4-28.12.i586.rpm 1d2779039c434857ca5121b3d3e09cce ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt3-devel-3.3.4-28.12.i586.rpm 9287eb02d84f11e81e78f18668ff48cb ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/i586/qt3-static-3.3.4-28.12.i586.rpm 90b80a996cf4b2f88be9139459074b72 Power PC Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/qt3-3.3.7-16.ppc.rpm d907538466a1aec06601e66cf8bab9fc ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/qt3-devel-3.3.7-16.ppc.rpm 5a557ed4eeb84fc5ef5008987bc2f7d4 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/qt3-static-3.3.7-17.ppc.rpm 621c47b80bd68248af27e0c6f7302b07 SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt3-3.3.5-58.29.ppc.rpm adce133ec7ee761f0d7e29fc276ecb6a ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt3-devel-3.3.5-58.29.ppc.rpm a523c72efa553247d9d51b86ded104e3 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/qt3-static-3.3.5-58.23.ppc.rpm 1d84829c55c88025ad935e00bcf7914f SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt3-3.3.4-28.12.ppc.rpm 0d8778e149c017961c6186d344b00410 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt3-devel-3.3.4-28.12.ppc.rpm 38fa12fb1fc419349b0ea2012b3792c5 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/ppc/qt3-static-3.3.4-28.12.ppc.rpm e486fc6f3b63269addbad7388851b983 x86-64 Platform: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/qt3-3.3.7-16.x86_64.rpm a9689162b332b017c3561ec53481f124 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/qt3-32bit-3.3.7-16.x86_64.rpm a3c14808373339842153f7c9944f457a ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/qt3-devel-3.3.7-16.x86_64.rpm 941d585951fc157032abd514542319cd ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/qt3-devel-32bit-3.3.7-16.x86_64.rpm 475a0c9c2a9db43eebb603a0a75f1d43 ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/qt3-static-3.3.7-17.x86_64.rpm ab880e3552fe7055af2b904a8ce6766f SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-3.3.5-58.29.x86_64.rpm 29a49dbc983dd2b44961e222568c5a36 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-32bit-3.3.5-58.29.x86_64.rpm ff95bbf6ced39ad0fca3c1e2ee5cdbea ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-devel-3.3.5-58.29.x86_64.rpm 51a8b3ca44065de5dd009728cdf8cb4b ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-devel-32bit-3.3.5-58.29.x86_64.rpm f20fc0ce47ac545832fe9c7a9871de9c ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/qt3-static-3.3.5-58.23.x86_64.rpm 5429c39b33f1f8c19e9fbe5d3825eaf5 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-3.3.4-28.12.x86_64.rpm 215fd4d7980a5a90dde5254f6154f621 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-32bit-3.3.4-28.12.x86_64.rpm 7ee78ac7c066e9f07523567d9888d9ac ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-devel-3.3.4-28.12.x86_64.rpm a7db3caa49181f65ed088ed27a5b6e08 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-devel-32bit-3.3.4-28.12.x86_64.rpm b469dabf630728e516c901e6b6f1f334 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/x86_64/qt3-static-3.3.4-28.12.x86_64.rpm 26cbb8222ceb38b0f0522d9a0aff1973 Sources: openSUSE 10.2: ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/qt3-3.3.7-16.src.rpm 87a3d1e99390cb5b5aa7758798048cfb ftp://ftp.suse.com/pub/suse/update/10.2/rpm/src/qt3-static-3.3.7-17.src.rpm b9fde7c7b0b3d63f63a4e73d3347150b SUSE LINUX 10.1: ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/qt3-3.3.5-58.29.src.rpm 035f23da9adbf1787cd1d93198879e27 ftp://ftp.suse.com/pub/suse/update/10.1/rpm/src/qt3-static-3.3.5-58.23.src.rpm c5f9262d130fcc6a7d159aab1c6950c9 SUSE LINUX 10.0: ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/qt3-3.3.4-28.12.src.rpm 1e0283a43b643e2ebfc2b13f6041e414 ftp://ftp.suse.com/pub/suse/i386/update/10.0/rpm/src/qt3-static-3.3.4-28.12.src.rpm bcd806c346bbd57730f14a61dfbf95f2 Maintenance customers are advised to apply the updated packages from the maintenance web: Open Enterprise Server http://support.novell.com/techcenter/psdb/eac35f375ac5bb22efa8b828b221e0bf.html Novell Linux POS 9 http://support.novell.com/techcenter/psdb/eac35f375ac5bb22efa8b828b221e0bf.html Novell Linux Desktop 9 http://support.novell.com/techcenter/psdb/eac35f375ac5bb22efa8b828b221e0bf.html SUSE SLES 9 http://support.novell.com/techcenter/psdb/eac35f375ac5bb22efa8b828b221e0bf.html SUSE Linux Enterprise Server 10 SP1 http://support.novell.com/techcenter/psdb/72e22bb06c6a063321588b1c9bbedc8c.html SUSE Linux Enterprise Desktop 10 SP1 http://support.novell.com/techcenter/psdb/72e22bb06c6a063321588b1c9bbedc8c.html UnitedLinux 1.0 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SuSE Linux Openexchange Server 4 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SuSE Linux Enterprise Server 8 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SuSE Linux Standard Server 8 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SuSE Linux School Server http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SUSE LINUX Retail Solution 8 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html SuSE Linux Desktop 1.0 http://support.novell.com/techcenter/psdb/752b9410f9a13bf0bf8f487debdf1d53.html ORIGINAL ADVISORY: http://www.novell.com/linux/security/advisories/2007_48_qt3.html OTHER REFERENCES: SA26298: http://secunia.com/advisories/26298/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------