QtCore, QtGui: Multiple vulnerabilities Multiple vulnerabilities have been discovered in QtCore and QtGui, possibly resulting in execution of arbitrary code, Denial of Service, or man-in-the-middle attacks. qt-core qt-gui 2013-11-22 2013-11-22 361401 382171 384103 455884 remote 4.8.4-r2 4.8.4-r2 4.8.4-r1 4.8.4-r1

The Qt toolkit is a comprehensive C++ application development framework.

Multiple vulnerabilities have been discovered in QtCore and QtGui. Please review the CVE identifiers referenced below for details.

A remote attacker could entice a user to open a specially crafted file with an application linked against QtCore or QtGui, possibly resulting in execution of arbitrary code with the privileges of the process or a Denial of Service condition. Furthermore, a remote attacker might employ a specially crafted certificate to conduct man-in-the-middle attacks on SSL connections.

There is no known workaround at this time.

All QtCore users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-qt/qtcore-4.8.4-r2"

All QtGui users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=dev-qt/qtgui-4.8.4-r1"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these packages.

CVE-2011-3193 CVE-2013-0254 Security advisory: Fraudulent certificates What the DigiNotar security breach means for Qt users underling ackle