GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jul 28, 2020 12:26 pm Post subject: [ GLSA 202007-38 ] QtGui |
|
|
Gentoo Linux Security Advisory
Title: QtGui: Arbitrary code execution (GLSA 202007-38)
Severity: normal
Exploitable: remote
Date: 2020-07-27
Bug(s): #719732
ID: 202007-38
Synopsis
A use-after-free was discovered in QtGui's Markdown handling code
possibly allowing a remote attacker to execute arbitrary code.
Background
QtGui is a module for the Qt toolkit.
Affected Packages
Package: dev-qt/qtgui
Vulnerable: < 5.14.2
Unaffected: >= 5.14.2
Architectures: All supported architectures
Description
QtGui’s setMarkdown has a use-after-free related to
QTextMarkdownImporter::insertBlock.
Impact
A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.
Workaround
There is no known workaround at this time.
Resolution
All QtGui users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-qt/qtgui-5.14.2"
| Note that the Qt suite is best kept in sync, so a world upgrade may be
advisable to keep your system in a good state.
References
CVE-2020-12267 |
|