RHSA-2015:1044-1: Important: virtio-win security and bug fix update

Red Hat Enterprise Linux: An updated virtio-win package that fixes one security issue and two bugs is
now available for Red Hat Enterprise Linux 7 Supplementary.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-3215

RHSA-2015:1043-1: Important: virtio-win security and bug fix update

Red Hat Enterprise Linux: An updated virtio-win package that fixes one security issue and two bugs is
now available for Red Hat Enterprise Linux 6 Supplementary.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
CVE-2015-3215

USN-2626-1: Qt vulnerabilities

Ubuntu Security Notice USN-2626-1

3rd June, 2015

qt4-x11, qtbase-opensource-src vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.10
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Qt could be made to crash or run programs as your login if it opened a
specially crafted file.

Software description

  • qt4-x11
    – Qt 4 libraries

  • qtbase-opensource-src
    – Qt 5 libraries

Details

Wolfgang Schenk discovered that Qt incorrectly handled certain malformed
GIF images. If a user or automated system were tricked into opening a
specially crafted GIF image, a remote attacker could use this issue to
cause Qt to crash, resulting in a denial of service. This issue only
applied to Ubuntu 12.04 LTS and Ubuntu 14.04 LTS. (CVE-2014-0190)

Fabian Vogt discovered that Qt incorrectly handled certain malformed BMP
images. If a user or automated system were tricked into opening a specially
crafted BMP image, a remote attacker could use this issue to cause Qt to
crash, resulting in a denial of service. (CVE-2015-0295)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed BMP images. If a user or automated system were tricked
into opening a specially crafted BMP image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1858)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed ICO images. If a user or automated system were tricked
into opening a specially crafted ICO image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1859)

Richard Moore and Fabian Vogt discovered that Qt incorrectly handled
certain malformed GIF images. If a user or automated system were tricked
into opening a specially crafted GIF image, a remote attacker could use
this issue to cause Qt to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2015-1860)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libqtgui4

4:4.8.6+git64-g5dc8b2b+dfsg-3~ubuntu6.1
libqt5gui5

5.4.1+dfsg-2ubuntu4.1
Ubuntu 14.10:
libqtgui4

4:4.8.6+git49-gbc62005+dfsg-1ubuntu1.1
libqt5gui5

5.3.0+dfsg-2ubuntu9.1
Ubuntu 14.04 LTS:
libqtgui4

4:4.8.5+git192-g085f851+dfsg-2ubuntu4.1
libqt5gui5

5.2.1+dfsg-1ubuntu14.3
Ubuntu 12.04 LTS:
libqtgui4

4:4.8.1-0ubuntu4.9

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart your session to make
all the necessary changes.

References

CVE-2014-0190,

CVE-2015-0295,

CVE-2015-1858,

CVE-2015-1859,

CVE-2015-1860

USN-2627-1: t1utils vulnerability

Ubuntu Security Notice USN-2627-1

3rd June, 2015

t1utils vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.10
  • Ubuntu 14.04 LTS

Summary

t1utils could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • t1utils
    – Collection of simple Type 1 font manipulation programs

Details

Jakub Wilk discovered that t1utils incorrectly handled certain malformed fonts.
If a user or automated system were tricked into opening a specially crafted
font, a remote attacker could crash the application, leading to a denial of
service, or possibly execute arbitrary code with user privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.10:
t1utils

1.37-2.1ubuntu0.1
Ubuntu 14.04 LTS:
t1utils

1.37-2ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2015-3905