ALT-BU-2015-2483-1
Branch sisyphus update bulletin.
Package qt5-xmlpatterns updated to version 5.4.2-alt1 for branch sisyphus in task 145200.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0295
The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
Modified: 2025-04-12
CVE-2015-1858
Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1859
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1860
Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-7298
ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
Package qt5-declarative updated to version 5.4.2-alt1 for branch sisyphus in task 145200.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0295
The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
Modified: 2025-04-12
CVE-2015-1858
Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1859
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1860
Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-7298
ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0295
The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
Modified: 2025-04-12
CVE-2015-1858
Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1859
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1860
Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-7298
ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
Package strongswan updated to version 5.3.2-alt1 for branch sisyphus in task 145220.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-4171
strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html
- http://www.debian.org/security/2015/dsa-3282
- http://www.openwall.com/lists/oss-security/2015/05/29/6
- http://www.openwall.com/lists/oss-security/2015/05/29/7
- http://www.openwall.com/lists/oss-security/2015/06/08/4
- http://www.securityfocus.com/bid/74933
- http://www.securitytracker.com/id/1032514
- http://www.ubuntu.com/usn/USN-2628-1
- https://bugzilla.suse.com/show_bug.cgi?id=933591
- https://play.google.com/store/apps/details?id=org.strongswan.android
- https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%2528cve-2015-4171%2529.html
- https://www.suse.com/security/cve/CVE-2015-4171.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00040.html
- http://www.debian.org/security/2015/dsa-3282
- http://www.openwall.com/lists/oss-security/2015/05/29/6
- http://www.openwall.com/lists/oss-security/2015/05/29/7
- http://www.openwall.com/lists/oss-security/2015/06/08/4
- http://www.securityfocus.com/bid/74933
- http://www.securitytracker.com/id/1032514
- http://www.ubuntu.com/usn/USN-2628-1
- https://bugzilla.suse.com/show_bug.cgi?id=933591
- https://play.google.com/store/apps/details?id=org.strongswan.android
- https://www.strongswan.org/blog/2015/06/08/strongswan-vulnerability-%2528cve-2015-4171%2529.html
- https://www.suse.com/security/cve/CVE-2015-4171.html
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-3218
The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161721.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162294.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-July/000432.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-May/000420.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-May/000421.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html
- http://www.securityfocus.com/bid/76086
- http://www.securitytracker.com/id/1035023
- https://usn.ubuntu.com/3717-1/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/161721.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162294.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-July/000432.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-May/000420.html
- http://lists.freedesktop.org/archives/polkit-devel/2015-May/000421.html
- http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2015-11/msg00042.html
- http://www.securityfocus.com/bid/76086
- http://www.securitytracker.com/id/1035023
- https://usn.ubuntu.com/3717-1/
Package qt5-multimedia updated to version 5.4.2-alt1 for branch sisyphus in task 145226.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0295
The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150800.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150940.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151034.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151121.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151138.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/151352.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html
- http://lists.qt-project.org/pipermail/announce/2015-February/000059.html
- http://www.securityfocus.com/bid/73029
- http://www.ubuntu.com/usn/USN-2626-1
Modified: 2025-04-12
CVE-2015-1858
Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74309
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108312/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1859
Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74307
- http://www.securityfocus.com/bid/74310
- http://www.ubuntu.com/usn/USN-2626-1
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-1860
Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155424.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155927.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155947.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155962.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155976.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/156727.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156761.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/156937.html
- http://lists.qt-project.org/pipermail/announce/2015-April/000067.html
- http://www.securityfocus.com/bid/74302
- http://www.ubuntu.com/usn/USN-2626-1
- https://codereview.qt-project.org/#/c/108248/
- https://security.gentoo.org/glsa/201603-10
Modified: 2025-04-12
CVE-2015-7298
ownCloud Desktop Client before 2.0.1, when compiled with a Qt release after 5.3.x, does not call QNetworkReply::ignoreSslErrors with the list of errors to be ignored, which makes it easier for remote attackers to conduct man-in-the-middle (MITM) attacks by leveraging a server using a self-signed certificate. NOTE: this vulnerability exists because of a partial CVE-2015-4456 regression.
Package kernel-image-un-def updated to version 4.0.5-alt1 for branch sisyphus in task 145221.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-4177
The collect_mounts function in fs/namespace.c in the Linux kernel before 4.0.5 does not properly consider that it may execute after a path has been unmounted, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
- http://openwall.com/lists/oss-security/2015/05/29/10
- http://openwall.com/lists/oss-security/2015/05/29/5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
- http://www.openwall.com/lists/oss-security/2015/06/04/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1248486
- https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cd4a40174b71acd021877341684d8bb1dc8ea4ae
- http://openwall.com/lists/oss-security/2015/05/29/10
- http://openwall.com/lists/oss-security/2015/05/29/5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
- http://www.openwall.com/lists/oss-security/2015/06/04/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1248486
- https://github.com/torvalds/linux/commit/cd4a40174b71acd021877341684d8bb1dc8ea4ae
Modified: 2025-04-12
CVE-2015-4178
The fs_pin implementation in the Linux kernel before 4.0.5 does not ensure the internal consistency of a certain list data structure, which allows local users to cause a denial of service (system crash) by leveraging user-namespace root access for an MNT_DETACH umount2 system call, related to fs/fs_pin.c and include/linux/fs_pin.h.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=820f9f147dcce2602eefd9b575bbbd9ea14f0953
- http://openwall.com/lists/oss-security/2015/05/29/10
- http://openwall.com/lists/oss-security/2015/05/29/5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
- http://www.openwall.com/lists/oss-security/2015/06/04/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1249849
- https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=820f9f147dcce2602eefd9b575bbbd9ea14f0953
- http://openwall.com/lists/oss-security/2015/05/29/10
- http://openwall.com/lists/oss-security/2015/05/29/5
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.0.5
- http://www.openwall.com/lists/oss-security/2015/06/04/5
- https://bugzilla.redhat.com/show_bug.cgi?id=1249849
- https://github.com/torvalds/linux/commit/820f9f147dcce2602eefd9b575bbbd9ea14f0953