From secunia security advisor at $URL: Description: 1) An error due to the "QLibrary::resolve()" method in QtCore4.dll loading libraries (e.g. wintab32.dll and dwmapi.dll in QtGui4.dll) in an insecure manner can be exploited to load arbitrary libraries when an application using this library e.g. opens a file located on a remote WebDAV or SMB share. Successful exploitation of this vulnerability allows execution of arbitrary code. This vulnerability is confirmed in version 4.6.3. Other versions may also be affected. 2) An error in the harfbuzz module (src/3rdparty/harfbuzz/src/harfbuzz-gpos.c) when processing certain fonts can be exploited to cause a buffer overflow. Successful exploitation of this vulnerability may allow execution of arbitrary code. Solution: Update to version 4.7.4 or: Git commit: https://qt.gitorious.org/qt/qt/commit/9ae6f2f9a57f0c3096d5785913e437953fa6775c
@qt I've omitted the status because 4.7.4 is in tree, but i don't know if you want stabilize all 4.7.4 qt packages now or simply patch the current.
Since qt 4.7.4 is ready for stabilization and after talked with Davide(pesa) on irc, I add this bug as a blocker for the qt-stabilization tracker ( bug 390963 ). We fast stabilize asap after the patch on bug 384089 will be applied
Unless I am mistaken, we should depend on qt-4.7.4 not block it. Please do correct me if I have it wrong. tnx.
Thanks, everyone. GLSA request filed.
Thank you all. Affected version removed from tree. Removing qt from CC, nothing to do here for us anymore.
CVE-2011-3193 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3193): Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
This issue was resolved and addressed in GLSA 201311-14 at http://security.gentoo.org/glsa/glsa-201311-14.xml by GLSA coordinator Sergey Popov (pinkbyte).