Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-0945 (GCVE-0-2009-0945)
Vulnerability from cvelistv5 – Published: 2009-05-13 17:00 – Updated: 2024-08-07 04:57- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T04:57:17.523Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "USN-822-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"name": "35805",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35805"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "FEDORA-2009-8039",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"name": "ADV-2009-1621",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "1022207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022207"
},
{
"name": "20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"name": "RHSA-2009:1130",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"name": "ADV-2009-1298",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"name": "35576",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35576"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "37746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37746"
},
{
"name": "36790",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36790"
},
{
"name": "APPLE-SA-2009-06-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "35056",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35056"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"name": "34924",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/34924"
},
{
"name": "36461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36461"
},
{
"name": "safari-webkit-svglist-bo(50477)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"name": "USN-823-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/823-1/"
},
{
"name": "DSA-1950",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "36062",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36062"
},
{
"name": "USN-857-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "oval:org.mitre.oval:def:11584",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "35095",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35095"
},
{
"name": "FEDORA-2009-8049",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3550"
},
{
"name": "FEDORA-2009-6166",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"name": "USN-836-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"name": "ADV-2009-1321",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-05-12T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-10T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "USN-822-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"name": "35805",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35805"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "43068",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "FEDORA-2009-8039",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"name": "ADV-2009-1621",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"name": "ADV-2011-0212",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "1022207",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022207"
},
{
"name": "20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"name": "RHSA-2009:1130",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"name": "ADV-2009-1298",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"name": "35576",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35576"
},
{
"name": "35074",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "37746",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37746"
},
{
"name": "36790",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36790"
},
{
"name": "APPLE-SA-2009-06-17-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "35056",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35056"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"name": "34924",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/34924"
},
{
"name": "36461",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36461"
},
{
"name": "safari-webkit-svglist-bo(50477)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"name": "USN-823-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/823-1/"
},
{
"name": "DSA-1950",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"name": "SUSE-SR:2011:002",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "36062",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36062"
},
{
"name": "USN-857-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"name": "APPLE-SA-2009-05-12",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"name": "TA09-133A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "oval:org.mitre.oval:def:11584",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"name": "ADV-2009-1297",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "35095",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35095"
},
{
"name": "FEDORA-2009-8049",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3550"
},
{
"name": "FEDORA-2009-6166",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"name": "USN-836-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"name": "ADV-2009-1321",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0945",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-822-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"name": "35805",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35805"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "FEDORA-2009-8039",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"name": "ADV-2009-1621",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "1022207",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022207"
},
{
"name": "20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"name": "RHSA-2009:1130",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"name": "ADV-2009-1298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"name": "35576",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35576"
},
{
"name": "35074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "37746",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37746"
},
{
"name": "36790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36790"
},
{
"name": "APPLE-SA-2009-06-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "35056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35056"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-022",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"name": "34924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34924"
},
{
"name": "36461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36461"
},
{
"name": "safari-webkit-svglist-bo(50477)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"name": "USN-823-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/823-1/"
},
{
"name": "DSA-1950",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "36062",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36062"
},
{
"name": "USN-857-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "oval:org.mitre.oval:def:11584",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "35095",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35095"
},
{
"name": "FEDORA-2009-8049",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"name": "http://support.apple.com/kb/HT3550",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3550"
},
{
"name": "FEDORA-2009-6166",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"name": "USN-836-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"name": "ADV-2009-1321",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=9019",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-0945",
"datePublished": "2009-05-13T17:00:00",
"dateReserved": "2009-03-18T00:00:00",
"dateUpdated": "2024-08-07T04:57:17.523Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-0945\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-05-13T17:30:00.187\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.\"},{\"lang\":\"es\",\"value\":\"WebKit, utilizado en Safari anterior a v3.2.3 y v4 Public Beta, en Apple Mac OS X v10.4.11 y v10.5 y anteriores a v10.5.7 y Windows permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto elaborado SVGList que provoca una corrupci\u00f3n de memoria.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EE39585-CF3B-4493-96D8-B394544C7643\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC90AA12-DD17-4607-90CB-E342E83F20BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F3E721C-00CA-4D51-B542-F2BC5C0D65BF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3267A41-1AE0-48B8-BD1F-DEC8A212851A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"855288F1-0242-4951-AB3F-B7AF13E21CF6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10082781-B93E-4B84-94F2-FA9749B4D92B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE1EBF04-C440-4A6B-93F2-DC3A812728C2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB077A2-927B-43AF-BFD5-0E78648C9394\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D09D5933-A7D9-4A61-B863-CD8E7D5E67D8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7817232-BE3E-4655-8282-A979E5D40D3D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E8D614-E1EE-42F1-9E55-EA54FB500621\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C73BED9E-29FB-4965-B38F-013FFE5A9170\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3B7DEC3-1C0B-4D13-98CD-CB7FAE7933B0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7723A9E8-1DE2-4C7D-81E6-4F79DCB09324\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3852BB02-47A1-40B3-8E32-8D8891A53114\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61F1C9B-44AF-4B35-A7B2-948EEF7639BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.2.2\",\"matchCriteriaId\":\"B6E139B2-65BD-4416-9D99-48E132BEC3A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09F4ADD0-449B-4DDD-9878-DE86CBD56756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0AECB7-FE62-4664-B3B8-8161DA6DA4BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A419AE8-F5A2-4E25-9004-AAAB325E201A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"64FE1AA1-32D1-4825-8B2B-E66093937D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E760CD65-A10E-44F1-B835-DA6B77057C93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30663B7F-3EDA-4B6B-9F39-65E2CEEB4543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91A09DA0-83E9-491D-A0A5-AF97B5463D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D91C7EF0-A56B-40E6-9CED-1228405D034E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE6078B0-4756-4E04-BAC4-C4EC90548A9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B5A3F2-70EE-4ECD-AD6A-0A72D9EBC755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C87EDB53-FB6E-4B10-B890-A7195D841C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*\",\"matchCriteriaId\":\"957FCFC4-565A-4F2F-8D3D-D0982E1723F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A450DC-CDF5-4EA0-A703-AFB3DEFE1395\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857C92E2-6870-409A-9457-75F8C5C7B959\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD75A4F-F529-4F5E-957D-380215F7B21B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"834EC299-2010-4306-8CEE-35D735583101\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"443FF271-A3AB-4659-80B2-89F771BF5371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D29B98E-2F62-4F6F-976D-FEC4EB07F106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3112AFEB-7893-467C-8B45-A44D5697BB79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC83309-3A97-4619-B5C1-574610838BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"891514D5-50C8-4EDC-81C5-24ABF8BCC022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25032A3A-9D05-4E69-9A22-C9B332976769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF75A31C-FE42-4CB4-A0E6-0CAB7B122483\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EDD80AB-2A6C-47FF-A1E9-DEB273C6B4E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EAC0DC3-7B55-49BC-89BC-C588E6FC6828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9315ADD-5B97-4639-9B59-806EFD7BC247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DD81AB-27D6-4CB0-BBF0-5710DAD55A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*\",\"matchCriteriaId\":\"21BAC0B8-063C-4772-8F1B-EB9A2F7A585C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAB4071-A883-4E04-BDDF-A121C4738E61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E44913D-BC8B-4AA1-84EB-EFEAC531B475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D3889ED-9329-4C84-A173-2553BEAE3EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B74019F-C365-4E13-BBB4-D84AD9C1F87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E0E57D5-A7C9-4985-8CE4-E0D4B8BBF371\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06494FA8-F12A-435A-97A4-F38C58DF43F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1BB047B-D45E-4695-AAEB-D0830DB1663E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*\",\"matchCriteriaId\":\"018A7A39-2AFD-47A9-AE88-7ABDBFE5EDA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*\",\"matchCriteriaId\":\"1082B33F-33B5-453A-A5AA-10F65AB2E625\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CF4DB54-AA7E-44C3-83E3-1A8971719D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFDCF83E-620C-40FA-9901-5D939E315143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3BAE980-449F-4F8C-A5BC-6CB7226E971A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A33F900-D405-40A8-A0A5-3C80320FF6E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4444A309-5A97-4E1C-B4EA-C4A070A98CBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CEB23DE-1A9D-480E-8B8B-9F110A8ABDE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E78F43-07BD-4D62-9512-DA738A92BC7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3180366-2240-467E-8AB9-BEA0430948F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB9CC52-E533-4306-9E92-73C84B264D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"912A26D1-3264-464F-B101-1796B35437E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01D8C2EF-D552-4279-A12E-70E292F39E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C453B588-15FD-4A9C-8BC1-6202A21DAE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"460A6F14-7CCE-47CA-BE0C-6DF32CD6A8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD634B1-4986-4E80-8BDC-58941893F6BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BB6761-3581-4AE6-85E0-1609D15D7618\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA1A4C8-9F87-449F-A11F-52E5D52247E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC87F61-3463-468A-BF0B-070816BBC3CA\"}]}]}],\"references\":[{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=9019\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00000.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00001.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35056\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35095\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35576\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/35805\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36062\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36461\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/36790\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/37746\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/43068\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3550\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1950\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1130.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/503594/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/34924\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id?1022207\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-822-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-836-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-857-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1298\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1321\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0212\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-022\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50477\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/823-1/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://code.google.com/p/chromium/issues/detail?id=9019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35095\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/35805\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36461\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/36790\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/37746\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43068\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.apple.com/kb/HT3639\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2009/dsa-1950\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1130.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/503594/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/34924\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1022207\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-822-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-836-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-857-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1321\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2009/1621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0212\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.zerodayinitiative.com/advisories/ZDI-09-022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/50477\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/823-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
GHSA-8RHJ-8GQW-PXM4
Vulnerability from github – Published: 2022-05-02 03:20 – Updated: 2025-04-09 04:09Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
{
"affected": [],
"aliases": [
"CVE-2009-0945"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-05-13T17:30:00Z",
"severity": "HIGH"
},
"details": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.",
"id": "GHSA-8rhj-8gqw-pxm4",
"modified": "2025-04-09T04:09:47Z",
"published": "2022-05-02T03:20:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0945"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/823-1"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"type": "WEB",
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
},
{
"type": "WEB",
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35056"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35074"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35095"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35576"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35805"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36062"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36461"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/36790"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37746"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/43068"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3549"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3550"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3639"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/34924"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022207"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"type": "WEB",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
}
],
"schema_version": "1.4.0",
"severity": []
}
OPENSUSE-SU-2024:10180-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libqt4-32bit-4.8.7-5.4 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libqt4-32bit-4.8.7-5.4 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10180",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10180-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0945 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0945/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3193 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3922 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-4929 page",
"url": "https://www.suse.com/security/cve/CVE-2012-4929/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6093 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-0254 page",
"url": "https://www.suse.com/security/cve/CVE-2013-0254/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-4549 page",
"url": "https://www.suse.com/security/cve/CVE-2013-4549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0190 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0190/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0295 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1858 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1858/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1859 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1859/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1860 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1860/"
}
],
"title": "libqt4-32bit-4.8.7-5.4 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10180-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libqt4-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-4.8.7-5.4.aarch64",
"product_id": "libqt4-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-devel-4.8.7-5.4.aarch64",
"product_id": "libqt4-devel-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-devel-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-devel-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-4.8.7-5.5.aarch64",
"product": {
"name": "libqt4-devel-doc-4.8.7-5.5.aarch64",
"product_id": "libqt4-devel-doc-4.8.7-5.5.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"product": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"product_id": "libqt4-devel-doc-data-4.8.7-5.5.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-linguist-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-linguist-4.8.7-5.4.aarch64",
"product_id": "libqt4-linguist-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"product_id": "libqt4-private-headers-devel-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-qt3support-4.8.7-5.4.aarch64",
"product_id": "libqt4-qt3support-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-qt3support-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-sql-4.8.7-5.4.aarch64",
"product_id": "libqt4-sql-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-sql-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-sql-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-mysql-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-mysql-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-postgresql-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"product_id": "libqt4-sql-sqlite-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-unixODBC-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"product": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"product_id": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-x11-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-x11-4.8.7-5.4.aarch64",
"product_id": "libqt4-x11-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "libqt4-x11-32bit-4.8.7-5.4.aarch64",
"product": {
"name": "libqt4-x11-32bit-4.8.7-5.4.aarch64",
"product_id": "libqt4-x11-32bit-4.8.7-5.4.aarch64"
}
},
{
"category": "product_version",
"name": "qt4-x11-tools-4.8.7-5.5.aarch64",
"product": {
"name": "qt4-x11-tools-4.8.7-5.5.aarch64",
"product_id": "qt4-x11-tools-4.8.7-5.5.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libqt4-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-4.8.7-5.4.ppc64le",
"product_id": "libqt4-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-devel-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-devel-4.8.7-5.4.ppc64le",
"product_id": "libqt4-devel-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-devel-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-4.8.7-5.5.ppc64le",
"product": {
"name": "libqt4-devel-doc-4.8.7-5.5.ppc64le",
"product_id": "libqt4-devel-doc-4.8.7-5.5.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"product": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"product_id": "libqt4-devel-doc-data-4.8.7-5.5.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-linguist-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-linguist-4.8.7-5.4.ppc64le",
"product_id": "libqt4-linguist-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"product_id": "libqt4-private-headers-devel-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-qt3support-4.8.7-5.4.ppc64le",
"product_id": "libqt4-qt3support-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-qt3support-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-sql-4.8.7-5.4.ppc64le",
"product_id": "libqt4-sql-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-sql-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-mysql-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-postgresql-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"product_id": "libqt4-sql-sqlite-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-unixODBC-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"product": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"product_id": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-x11-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-x11-4.8.7-5.4.ppc64le",
"product_id": "libqt4-x11-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"product": {
"name": "libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"product_id": "libqt4-x11-32bit-4.8.7-5.4.ppc64le"
}
},
{
"category": "product_version",
"name": "qt4-x11-tools-4.8.7-5.5.ppc64le",
"product": {
"name": "qt4-x11-tools-4.8.7-5.5.ppc64le",
"product_id": "qt4-x11-tools-4.8.7-5.5.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libqt4-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-4.8.7-5.4.s390x",
"product_id": "libqt4-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-devel-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-devel-4.8.7-5.4.s390x",
"product_id": "libqt4-devel-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-devel-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-devel-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-devel-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-4.8.7-5.5.s390x",
"product": {
"name": "libqt4-devel-doc-4.8.7-5.5.s390x",
"product_id": "libqt4-devel-doc-4.8.7-5.5.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-data-4.8.7-5.5.s390x",
"product": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.s390x",
"product_id": "libqt4-devel-doc-data-4.8.7-5.5.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-linguist-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-linguist-4.8.7-5.4.s390x",
"product_id": "libqt4-linguist-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-private-headers-devel-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.s390x",
"product_id": "libqt4-private-headers-devel-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-qt3support-4.8.7-5.4.s390x",
"product_id": "libqt4-qt3support-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-qt3support-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-sql-4.8.7-5.4.s390x",
"product_id": "libqt4-sql-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-sql-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-sql-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-mysql-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-mysql-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-mysql-32bit-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-postgresql-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.s390x",
"product_id": "libqt4-sql-sqlite-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-unixODBC-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"product": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"product_id": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-x11-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-x11-4.8.7-5.4.s390x",
"product_id": "libqt4-x11-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "libqt4-x11-32bit-4.8.7-5.4.s390x",
"product": {
"name": "libqt4-x11-32bit-4.8.7-5.4.s390x",
"product_id": "libqt4-x11-32bit-4.8.7-5.4.s390x"
}
},
{
"category": "product_version",
"name": "qt4-x11-tools-4.8.7-5.5.s390x",
"product": {
"name": "qt4-x11-tools-4.8.7-5.5.s390x",
"product_id": "qt4-x11-tools-4.8.7-5.5.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libqt4-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-4.8.7-5.4.x86_64",
"product_id": "libqt4-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-devel-4.8.7-5.4.x86_64",
"product_id": "libqt4-devel-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-devel-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-devel-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-4.8.7-5.5.x86_64",
"product": {
"name": "libqt4-devel-doc-4.8.7-5.5.x86_64",
"product_id": "libqt4-devel-doc-4.8.7-5.5.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"product": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"product_id": "libqt4-devel-doc-data-4.8.7-5.5.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-linguist-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-linguist-4.8.7-5.4.x86_64",
"product_id": "libqt4-linguist-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"product_id": "libqt4-private-headers-devel-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-qt3support-4.8.7-5.4.x86_64",
"product_id": "libqt4-qt3support-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-qt3support-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-sql-4.8.7-5.4.x86_64",
"product_id": "libqt4-sql-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-sql-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-sql-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-mysql-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-mysql-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-postgresql-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"product_id": "libqt4-sql-sqlite-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-unixODBC-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"product": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"product_id": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-x11-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-x11-4.8.7-5.4.x86_64",
"product_id": "libqt4-x11-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "libqt4-x11-32bit-4.8.7-5.4.x86_64",
"product": {
"name": "libqt4-x11-32bit-4.8.7-5.4.x86_64",
"product_id": "libqt4-x11-32bit-4.8.7-5.4.x86_64"
}
},
{
"category": "product_version",
"name": "qt4-x11-tools-4.8.7-5.5.x86_64",
"product": {
"name": "qt4-x11-tools-4.8.7-5.5.x86_64",
"product_id": "qt4-x11-tools-4.8.7-5.5.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-devel-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-devel-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-devel-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-devel-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-devel-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-devel-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-devel-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-4.8.7-5.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64"
},
"product_reference": "libqt4-devel-doc-4.8.7-5.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-4.8.7-5.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le"
},
"product_reference": "libqt4-devel-doc-4.8.7-5.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-4.8.7-5.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x"
},
"product_reference": "libqt4-devel-doc-4.8.7-5.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-4.8.7-5.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64"
},
"product_reference": "libqt4-devel-doc-4.8.7-5.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64"
},
"product_reference": "libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le"
},
"product_reference": "libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x"
},
"product_reference": "libqt4-devel-doc-data-4.8.7-5.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-devel-doc-data-4.8.7-5.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64"
},
"product_reference": "libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-linguist-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-linguist-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-linguist-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-linguist-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-linguist-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-linguist-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-linguist-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-linguist-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-private-headers-devel-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-private-headers-devel-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-qt3support-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-qt3support-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-qt3support-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-qt3support-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-qt3support-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-sql-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-sql-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-sql-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-sql-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-sql-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-sql-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-sql-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-mysql-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-mysql-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-mysql-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-postgresql-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-sql-sqlite-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64"
},
"product_reference": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le"
},
"product_reference": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x"
},
"product_reference": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64"
},
"product_reference": "libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-x11-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-x11-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-x11-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-x11-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-32bit-4.8.7-5.4.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64"
},
"product_reference": "libqt4-x11-32bit-4.8.7-5.4.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-32bit-4.8.7-5.4.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le"
},
"product_reference": "libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-32bit-4.8.7-5.4.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x"
},
"product_reference": "libqt4-x11-32bit-4.8.7-5.4.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libqt4-x11-32bit-4.8.7-5.4.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64"
},
"product_reference": "libqt4-x11-32bit-4.8.7-5.4.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qt4-x11-tools-4.8.7-5.5.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64"
},
"product_reference": "qt4-x11-tools-4.8.7-5.5.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qt4-x11-tools-4.8.7-5.5.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le"
},
"product_reference": "qt4-x11-tools-4.8.7-5.5.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qt4-x11-tools-4.8.7-5.5.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x"
},
"product_reference": "qt4-x11-tools-4.8.7-5.5.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "qt4-x11-tools-4.8.7-5.5.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
},
"product_reference": "qt4-x11-tools-4.8.7-5.5.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0945",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0945"
}
],
"notes": [
{
"category": "general",
"text": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0945",
"url": "https://www.suse.com/security/cve/CVE-2009-0945"
},
{
"category": "external",
"summary": "SUSE Bug 512559 for CVE-2009-0945",
"url": "https://bugzilla.suse.com/512559"
},
{
"category": "external",
"summary": "SUSE Bug 515124 for CVE-2009-0945",
"url": "https://bugzilla.suse.com/515124"
},
{
"category": "external",
"summary": "SUSE Bug 541632 for CVE-2009-0945",
"url": "https://bugzilla.suse.com/541632"
},
{
"category": "external",
"summary": "SUSE Bug 601349 for CVE-2009-0945",
"url": "https://bugzilla.suse.com/601349"
},
{
"category": "external",
"summary": "SUSE Bug 644114 for CVE-2009-0945",
"url": "https://bugzilla.suse.com/644114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-0945"
},
{
"cve": "CVE-2011-3193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3193"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3193",
"url": "https://www.suse.com/security/cve/CVE-2011-3193"
},
{
"category": "external",
"summary": "SUSE Bug 714984 for CVE-2011-3193",
"url": "https://bugzilla.suse.com/714984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2011-3193"
},
{
"cve": "CVE-2011-3922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3922"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3922",
"url": "https://www.suse.com/security/cve/CVE-2011-3922"
},
{
"category": "external",
"summary": "SUSE Bug 739904 for CVE-2011-3922",
"url": "https://bugzilla.suse.com/739904"
},
{
"category": "external",
"summary": "SUSE Bug 740493 for CVE-2011-3922",
"url": "https://bugzilla.suse.com/740493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-3922"
},
{
"cve": "CVE-2012-4929",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-4929"
}
],
"notes": [
{
"category": "general",
"text": "The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a \"CRIME\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-4929",
"url": "https://www.suse.com/security/cve/CVE-2012-4929"
},
{
"category": "external",
"summary": "SUSE Bug 1011293 for CVE-2012-4929",
"url": "https://bugzilla.suse.com/1011293"
},
{
"category": "external",
"summary": "SUSE Bug 779952 for CVE-2012-4929",
"url": "https://bugzilla.suse.com/779952"
},
{
"category": "external",
"summary": "SUSE Bug 793420 for CVE-2012-4929",
"url": "https://bugzilla.suse.com/793420"
},
{
"category": "external",
"summary": "SUSE Bug 803004 for CVE-2012-4929",
"url": "https://bugzilla.suse.com/803004"
},
{
"category": "external",
"summary": "SUSE Bug 847895 for CVE-2012-4929",
"url": "https://bugzilla.suse.com/847895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-4929"
},
{
"cve": "CVE-2012-6093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6093"
}
],
"notes": [
{
"category": "general",
"text": "The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an \"incompatible structure layout\" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6093",
"url": "https://www.suse.com/security/cve/CVE-2012-6093"
},
{
"category": "external",
"summary": "SUSE Bug 797006 for CVE-2012-6093",
"url": "https://bugzilla.suse.com/797006"
},
{
"category": "external",
"summary": "SUSE Bug 802634 for CVE-2012-6093",
"url": "https://bugzilla.suse.com/802634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-6093"
},
{
"cve": "CVE-2013-0254",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-0254"
}
],
"notes": [
{
"category": "general",
"text": "The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-0254",
"url": "https://www.suse.com/security/cve/CVE-2013-0254"
},
{
"category": "external",
"summary": "SUSE Bug 802634 for CVE-2013-0254",
"url": "https://bugzilla.suse.com/802634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2013-0254"
},
{
"cve": "CVE-2013-4549",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-4549"
}
],
"notes": [
{
"category": "general",
"text": "QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-4549",
"url": "https://www.suse.com/security/cve/CVE-2013-4549"
},
{
"category": "external",
"summary": "SUSE Bug 1039291 for CVE-2013-4549",
"url": "https://bugzilla.suse.com/1039291"
},
{
"category": "external",
"summary": "SUSE Bug 856832 for CVE-2013-4549",
"url": "https://bugzilla.suse.com/856832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-4549"
},
{
"cve": "CVE-2014-0190",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0190"
}
],
"notes": [
{
"category": "general",
"text": "The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0190",
"url": "https://www.suse.com/security/cve/CVE-2014-0190"
},
{
"category": "external",
"summary": "SUSE Bug 875470 for CVE-2014-0190",
"url": "https://bugzilla.suse.com/875470"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-0190"
},
{
"cve": "CVE-2015-0295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0295"
}
],
"notes": [
{
"category": "general",
"text": "The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0295",
"url": "https://www.suse.com/security/cve/CVE-2015-0295"
},
{
"category": "external",
"summary": "SUSE Bug 921999 for CVE-2015-0295",
"url": "https://bugzilla.suse.com/921999"
},
{
"category": "external",
"summary": "SUSE Bug 927806 for CVE-2015-0295",
"url": "https://bugzilla.suse.com/927806"
},
{
"category": "external",
"summary": "SUSE Bug 927807 for CVE-2015-0295",
"url": "https://bugzilla.suse.com/927807"
},
{
"category": "external",
"summary": "SUSE Bug 927808 for CVE-2015-0295",
"url": "https://bugzilla.suse.com/927808"
},
{
"category": "external",
"summary": "SUSE Bug 936523 for CVE-2015-0295",
"url": "https://bugzilla.suse.com/936523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2015-0295"
},
{
"cve": "CVE-2015-1858",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1858"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in gui/image/qbmphandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted BMP image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1858",
"url": "https://www.suse.com/security/cve/CVE-2015-1858"
},
{
"category": "external",
"summary": "SUSE Bug 921999 for CVE-2015-1858",
"url": "https://bugzilla.suse.com/921999"
},
{
"category": "external",
"summary": "SUSE Bug 927806 for CVE-2015-1858",
"url": "https://bugzilla.suse.com/927806"
},
{
"category": "external",
"summary": "SUSE Bug 927807 for CVE-2015-1858",
"url": "https://bugzilla.suse.com/927807"
},
{
"category": "external",
"summary": "SUSE Bug 927808 for CVE-2015-1858",
"url": "https://bugzilla.suse.com/927808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-1858"
},
{
"cve": "CVE-2015-1859",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1859"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in plugins/imageformats/ico/qicohandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault and crash) and possibly execute arbitrary code via a crafted ICO image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1859",
"url": "https://www.suse.com/security/cve/CVE-2015-1859"
},
{
"category": "external",
"summary": "SUSE Bug 921999 for CVE-2015-1859",
"url": "https://bugzilla.suse.com/921999"
},
{
"category": "external",
"summary": "SUSE Bug 927806 for CVE-2015-1859",
"url": "https://bugzilla.suse.com/927806"
},
{
"category": "external",
"summary": "SUSE Bug 927807 for CVE-2015-1859",
"url": "https://bugzilla.suse.com/927807"
},
{
"category": "external",
"summary": "SUSE Bug 927808 for CVE-2015-1859",
"url": "https://bugzilla.suse.com/927808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-1859"
},
{
"cve": "CVE-2015-1860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1860"
}
],
"notes": [
{
"category": "general",
"text": "Multiple buffer overflows in gui/image/qgifhandler.cpp in the QtBase module in Qt before 4.8.7 and 5.x before 5.4.2 allow remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a crafted GIF image.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1860",
"url": "https://www.suse.com/security/cve/CVE-2015-1860"
},
{
"category": "external",
"summary": "SUSE Bug 921999 for CVE-2015-1860",
"url": "https://bugzilla.suse.com/921999"
},
{
"category": "external",
"summary": "SUSE Bug 927806 for CVE-2015-1860",
"url": "https://bugzilla.suse.com/927806"
},
{
"category": "external",
"summary": "SUSE Bug 927807 for CVE-2015-1860",
"url": "https://bugzilla.suse.com/927807"
},
{
"category": "external",
"summary": "SUSE Bug 927808 for CVE-2015-1860",
"url": "https://bugzilla.suse.com/927808"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:libqt4-devel-doc-data-4.8.7-5.5.x86_64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-linguist-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-private-headers-devel-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-qt3support-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-mysql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-postgresql-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-sql-sqlite-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-32bit-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.aarch64",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.ppc64le",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.s390x",
"openSUSE Tumbleweed:libqt4-sql-unixODBC-4.8.7-5.3.x86_64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-32bit-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.aarch64",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.ppc64le",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.s390x",
"openSUSE Tumbleweed:libqt4-x11-4.8.7-5.4.x86_64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.aarch64",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.ppc64le",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.s390x",
"openSUSE Tumbleweed:qt4-x11-tools-4.8.7-5.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-1860"
}
]
}
VAR-200905-0505
Vulnerability from variot - Updated: 2025-12-22 20:36Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption. WebKit of insertItemBefore Methods include SVGPathList A vulnerability exists in the execution of arbitrary code due to flaws in the processing of documents with data structures.A third party may execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The specific flaw exists during the parsing of malformed SVGLists via the SVGPathList data structure, the following lists are affected: SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList, SVGLengthList. When a negative index argument is suppled to the insertItemBefore() method, a memory corruption occurs resulting in the ability to execute arbitrary code. WebKit is prone to a remote memory-corruption vulnerability. Failed exploit attempts will result in a denial-of-service condition. The issue also affects the following: Apple Safari prior to 3.2.3 Apple Mac OS X v10.5 through v10.5.6, Apple Mac OS X Server v10.5 through v10.5.6 Google Chrome prior to 1.0.154.65. Safari is the web browser bundled by default in the Apple operating system. There is a memory corruption vulnerability in the processing of SVGList objects in WebKit in Safari. Safari has multiple input validation errors in its handling of the feed: URL, and accessing a malicious feed: URL can lead to arbitrary JavaScript execution. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-0791). (CVE-2009-1709).
This update provides a solution to this vulnerability.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709
Updated Packages:
Corporate 4.0: 0ec7bf7b568cd017c976b581046a4665 corporate/4.0/i586/kdegraphics-3.5.4-0.9.20060mlcs4.i586.rpm 32bf2180033208d0d7fb98a1670f76ef corporate/4.0/i586/kdegraphics-common-3.5.4-0.9.20060mlcs4.i586.rpm fc4d07f38b7c38a41924a87d1da87a7b corporate/4.0/i586/kdegraphics-kcolorchooser-3.5.4-0.9.20060mlcs4.i586.rpm 60ac7ec91991f24378608445602156b4 corporate/4.0/i586/kdegraphics-kcoloredit-3.5.4-0.9.20060mlcs4.i586.rpm e23a46f8928ff9bf43dfb85d030d66f4 corporate/4.0/i586/kdegraphics-kdvi-3.5.4-0.9.20060mlcs4.i586.rpm 0da4d8567fd0102fa3b71e14d7e77cce corporate/4.0/i586/kdegraphics-kfax-3.5.4-0.9.20060mlcs4.i586.rpm 71e5fc67191644df05dc3eeaf3eea182 corporate/4.0/i586/kdegraphics-kghostview-3.5.4-0.9.20060mlcs4.i586.rpm 5f712336e95e534ee5438bd6b601a6d5 corporate/4.0/i586/kdegraphics-kiconedit-3.5.4-0.9.20060mlcs4.i586.rpm b37b6097ac674ebc3296125ed1c33615 corporate/4.0/i586/kdegraphics-kolourpaint-3.5.4-0.9.20060mlcs4.i586.rpm d873b5de956fa6f936135a0046387bf1 corporate/4.0/i586/kdegraphics-kooka-3.5.4-0.9.20060mlcs4.i586.rpm 2474e300ccd833db71a756b34d9fec94 corporate/4.0/i586/kdegraphics-kpdf-3.5.4-0.9.20060mlcs4.i586.rpm 0454ff14fce7eda256890967555693bb corporate/4.0/i586/kdegraphics-kpovmodeler-3.5.4-0.9.20060mlcs4.i586.rpm bd79021aab7f406657774da069cc677d corporate/4.0/i586/kdegraphics-kruler-3.5.4-0.9.20060mlcs4.i586.rpm 5ab29c519209bc802613729896d84c63 corporate/4.0/i586/kdegraphics-ksnapshot-3.5.4-0.9.20060mlcs4.i586.rpm 771cf8aa682b615babcc8748cc09f4a9 corporate/4.0/i586/kdegraphics-ksvg-3.5.4-0.9.20060mlcs4.i586.rpm 1445a204c7aa0dae1eefab7b0d5f5839 corporate/4.0/i586/kdegraphics-kuickshow-3.5.4-0.9.20060mlcs4.i586.rpm fbd113f1442541e0cb05b624a2e08c74 corporate/4.0/i586/kdegraphics-kview-3.5.4-0.9.20060mlcs4.i586.rpm 94dec05663eb9499d974ba3d6b14e885 corporate/4.0/i586/kdegraphics-mrmlsearch-3.5.4-0.9.20060mlcs4.i586.rpm 86ca6e187a798897c25d5c9a66112b96 corporate/4.0/i586/libkdegraphics0-common-3.5.4-0.9.20060mlcs4.i586.rpm ed07099f0f6983c87188cd7cbe6fa4f5 corporate/4.0/i586/libkdegraphics0-common-devel-3.5.4-0.9.20060mlcs4.i586.rpm 978a543e6af07842a0facab486419848 corporate/4.0/i586/libkdegraphics0-kghostview-3.5.4-0.9.20060mlcs4.i586.rpm 9a7f4cf394eda5f91fe2d288bf6f6248 corporate/4.0/i586/libkdegraphics0-kghostview-devel-3.5.4-0.9.20060mlcs4.i586.rpm c47855bb4af164237de071eca478b852 corporate/4.0/i586/libkdegraphics0-kooka-3.5.4-0.9.20060mlcs4.i586.rpm 61361d801c9e0bfc677147a0ebed83cc corporate/4.0/i586/libkdegraphics0-kooka-devel-3.5.4-0.9.20060mlcs4.i586.rpm 78333238aa1949fbd32f4bbe17587819 corporate/4.0/i586/libkdegraphics0-kpovmodeler-3.5.4-0.9.20060mlcs4.i586.rpm cd42ba63d5df96750d5e0b65662a16c7 corporate/4.0/i586/libkdegraphics0-kpovmodeler-devel-3.5.4-0.9.20060mlcs4.i586.rpm 45077a5366e72fd55f7ddf819ce087f9 corporate/4.0/i586/libkdegraphics0-ksvg-3.5.4-0.9.20060mlcs4.i586.rpm efbe90c91e2762073332c0994bdf0349 corporate/4.0/i586/libkdegraphics0-ksvg-devel-3.5.4-0.9.20060mlcs4.i586.rpm 4acdcf255082a2bb7328a4ac805dbcaa corporate/4.0/i586/libkdegraphics0-kview-3.5.4-0.9.20060mlcs4.i586.rpm fddafb351cdd4da03e33f08d4af73622 corporate/4.0/i586/libkdegraphics0-kview-devel-3.5.4-0.9.20060mlcs4.i586.rpm 64deef0a4a406a04f476f5263478d2e3 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.9.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 0fd67ad8a003f2cc7b4b5b0f295af59e corporate/4.0/x86_64/kdegraphics-3.5.4-0.9.20060mlcs4.x86_64.rpm 1e62299bf29230174331f43de7215366 corporate/4.0/x86_64/kdegraphics-common-3.5.4-0.9.20060mlcs4.x86_64.rpm a9c5b4e3f0db3db937261c8f504c44ca corporate/4.0/x86_64/kdegraphics-kcolorchooser-3.5.4-0.9.20060mlcs4.x86_64.rpm 0c0cfaf7fb1fe22bac1740425df135b2 corporate/4.0/x86_64/kdegraphics-kcoloredit-3.5.4-0.9.20060mlcs4.x86_64.rpm 9e961f83cdc9734007f9d5a90f4c888c corporate/4.0/x86_64/kdegraphics-kdvi-3.5.4-0.9.20060mlcs4.x86_64.rpm a7a5204dadd20443f879cc696906ed70 corporate/4.0/x86_64/kdegraphics-kfax-3.5.4-0.9.20060mlcs4.x86_64.rpm 1bfb78ecd8e44dc61c48dad786238bad corporate/4.0/x86_64/kdegraphics-kghostview-3.5.4-0.9.20060mlcs4.x86_64.rpm ddf5c19dbfcc64bb227173cb331dd661 corporate/4.0/x86_64/kdegraphics-kiconedit-3.5.4-0.9.20060mlcs4.x86_64.rpm 3b77da395b388a38a39805244ffb45dc corporate/4.0/x86_64/kdegraphics-kolourpaint-3.5.4-0.9.20060mlcs4.x86_64.rpm 52a4a93e2655edafc36d2e75c4adacb0 corporate/4.0/x86_64/kdegraphics-kooka-3.5.4-0.9.20060mlcs4.x86_64.rpm 6f4cdfee02441d22543b93252023490c corporate/4.0/x86_64/kdegraphics-kpdf-3.5.4-0.9.20060mlcs4.x86_64.rpm e7351156f775cda56b9a026d6d230b66 corporate/4.0/x86_64/kdegraphics-kpovmodeler-3.5.4-0.9.20060mlcs4.x86_64.rpm 54062812371d272f1f7115143d750d18 corporate/4.0/x86_64/kdegraphics-kruler-3.5.4-0.9.20060mlcs4.x86_64.rpm 7967101313636798c9e67d7d6d9f7e8e corporate/4.0/x86_64/kdegraphics-ksnapshot-3.5.4-0.9.20060mlcs4.x86_64.rpm db3dc6a00c46848ae9a31f8db2adb76b corporate/4.0/x86_64/kdegraphics-ksvg-3.5.4-0.9.20060mlcs4.x86_64.rpm 7bf017292f4ea7eb0007e30ee5f7ea06 corporate/4.0/x86_64/kdegraphics-kuickshow-3.5.4-0.9.20060mlcs4.x86_64.rpm ea3a9b102557f7b71e5988b11812fb9d corporate/4.0/x86_64/kdegraphics-kview-3.5.4-0.9.20060mlcs4.x86_64.rpm 49ce4f2918d3ca3a726f157db4e326ff corporate/4.0/x86_64/kdegraphics-mrmlsearch-3.5.4-0.9.20060mlcs4.x86_64.rpm 37962c005b21c9f034168193ac143686 corporate/4.0/x86_64/lib64kdegraphics0-common-3.5.4-0.9.20060mlcs4.x86_64.rpm 78bc99fdf48570c57b8d8e04578d0b0f corporate/4.0/x86_64/lib64kdegraphics0-common-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm f2627650fccc5194666844f18ff6a2e9 corporate/4.0/x86_64/lib64kdegraphics0-kghostview-3.5.4-0.9.20060mlcs4.x86_64.rpm d6031ac8e48c554df0456a5c6ca25a6c corporate/4.0/x86_64/lib64kdegraphics0-kghostview-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm e485c792b85edd25c29025900c71d9a5 corporate/4.0/x86_64/lib64kdegraphics0-kooka-3.5.4-0.9.20060mlcs4.x86_64.rpm c9d19e68cc7d9b1c17fce9f572c063d7 corporate/4.0/x86_64/lib64kdegraphics0-kooka-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm c984a53011f393d7cbb6f2cc0774efa3 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-3.5.4-0.9.20060mlcs4.x86_64.rpm 8d1c6a2c8eaf161632f5a333bd1639d8 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm 0f066ee3e189779638a4c5d7c6d08b78 corporate/4.0/x86_64/lib64kdegraphics0-ksvg-3.5.4-0.9.20060mlcs4.x86_64.rpm 7efa7c6905de7b624e95ea8ba16088d8 corporate/4.0/x86_64/lib64kdegraphics0-ksvg-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm e407dc0360d9108ce56b58b0bbce8d7e corporate/4.0/x86_64/lib64kdegraphics0-kview-3.5.4-0.9.20060mlcs4.x86_64.rpm a1227e9c72b228994582c91678763e1e corporate/4.0/x86_64/lib64kdegraphics0-kview-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm 64deef0a4a406a04f476f5263478d2e3 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.9.20060mlcs4.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLIQ2nmqjQ0CJFipgRAtveAKDD76Mn1SvVN71DMEESnFqN7Qk5+wCdGGMa H2tf9QJ8H8rPmPybWHl8Yxs= =DMWI -----END PGP SIGNATURE----- . (CVE-2009-0945)
Several flaws were discovered in the QtWebKit browser and JavaScript engines. (CVE-2009-1699, CVE-2009-1713)
It was discovered that QtWebKit did not prevent the loading of local Java applets. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Debian Security Advisory DSA-1950 security@debian.org http://www.debian.org/security/ Giuseppe Iuculano December 12, 2009 http://www.debian.org/security/faq
Package : webkit Vulnerability : several Problem type : remote (local) Debian-specific: no CVE Id : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698 CVE-2009-1711 CVE-2009-1712 CVE-2009-1725 CVE-2009-1714 CVE-2009-1710 CVE-2009-1697 CVE-2009-1695 CVE-2009-1693 CVE-2009-1694 CVE-2009-1681 CVE-2009-1684 CVE-2009-1692 Debian Bug : 532724 532725 534946 535793 538346
Several vulnerabilities have been discovered in webkit, a Web content engine library for Gtk+.
CVE-2009-1711
WebKit does not properly initialize memory for Attr DOM objects, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted HTML document.
CVE-2009-1725
WebKit do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
CVE-2009-1714
Cross-site scripting (XSS) vulnerability in Web Inspector in WebKit allows user-assisted remote attackers to inject arbitrary web script or HTML, and read local files, via vectors related to the improper escaping of HTML attributes.
CVE-2009-1710
WebKit allows remote attackers to spoof the browser's display of the host name, security indicators, and unspecified other UI elements via a custom cursor in conjunction with a modified CSS3 hotspot property.
CVE-2009-1697
CRLF injection vulnerability in WebKit allows remote attackers to inject HTTP headers and bypass the Same Origin Policy via a crafted HTML document, related to cross-site scripting (XSS) attacks that depend on communication with arbitrary web sites on the same server through use of XMLHttpRequest without a Host header.
CVE-2009-1695
Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via vectors involving access to frame contents after completion of a page transition.
CVE-2009-1693
WebKit allows remote attackers to read images from arbitrary web sites via a CANVAS element with an SVG image, related to a "cross-site image capture issue."
CVE-2009-1694
WebKit does not properly handle redirects, which allows remote attackers to read images from arbitrary web sites via vectors involving a CANVAS element and redirection, related to a "cross-site image capture issue."
CVE-2009-1681
WebKit does not prevent web sites from loading third-party content into a subframe, which allows remote attackers to bypass the Same Origin Policy and conduct "clickjacking" attacks via a crafted HTML document.
CVE-2009-1684
Cross-site scripting (XSS) vulnerability in WebKit allows remote attackers to inject arbitrary web script or HTML via an event handler that triggers script execution in the context of the next loaded document.
CVE-2009-1692
WebKit allows remote attackers to cause a denial of service (memory consumption or device reset) via a web page containing an HTMLSelectElement object with a large length attribute, related to the length property of a Select object.
For the stable distribution (lenny), these problems has been fixed in version 1.0.1-4+lenny2.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 1.1.16-1.
We recommend that you upgrade your webkit package.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 5.0 alias lenny
Debian (stable)
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1.orig.tar.gz Size/MD5 checksum: 13418752 4de68a5773998bea14e8939aa341c466
http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.diff.gz Size/MD5 checksum: 35369 506c8f2fef73a9fc856264f11a3ad27e http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.dsc Size/MD5 checksum: 1447 b5f01d6428f01d79bfe18338064452ab
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-dev_1.0.1-4+lenny2_all.deb Size/MD5 checksum: 35164 df682bbcd13389c2f50002c2aaf7347b
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_alpha.deb Size/MD5 checksum: 65193740 fc8b613c9c41ef0f0d3856e7ee3deeae
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_alpha.deb Size/MD5 checksum: 4254938 252b95b962bda11c000f9c0543673c1b
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_amd64.deb Size/MD5 checksum: 3502994 4a96cad1e302e7303d41d6f866215da4
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_amd64.deb Size/MD5 checksum: 62518476 d723a8c76b373026752b6f68e5fc4950
arm architecture (ARM)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_arm.deb Size/MD5 checksum: 2721324 1fac2f59ffa9e3d7b8697aae262f09e4
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_arm.deb Size/MD5 checksum: 61478724 260faea7d5ba766268faad888b3e61ff
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_armel.deb Size/MD5 checksum: 2770654 5b88754e9804d9290537afdf6127643a
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_armel.deb Size/MD5 checksum: 59892062 99c8f13257a054f42686ab9c6329d490
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_hppa.deb Size/MD5 checksum: 3869020 c61be734b6511788e8cc235a5d672eab
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_hppa.deb Size/MD5 checksum: 63935342 f1db2bd7b5c22e257c74100798017f30
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_i386.deb Size/MD5 checksum: 62161744 f89fc6ac6d1110cabe47dd9184c9a9ca
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_i386.deb Size/MD5 checksum: 3016584 b854f5294527adac80e9776efed37cd7
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_ia64.deb Size/MD5 checksum: 5547624 2bd2100a345089282117317a9ab2e7d1
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_ia64.deb Size/MD5 checksum: 62685224 5eaff5d431cf4a85beeaa0b66c91958c
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mips.deb Size/MD5 checksum: 3109134 a680a8f105a19bf1b21a5034c14c4822
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mips.deb Size/MD5 checksum: 64547832 dd440891a1861262bc92deb0a1ead013
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mipsel.deb Size/MD5 checksum: 2992848 952d643be475c35e253a8757075cd41b
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mipsel.deb Size/MD5 checksum: 62135970 7cd635047e3f9bd000ff4547a47eaaec
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_s390.deb Size/MD5 checksum: 3456914 6fc856a50b3f899c36381ed8d51af44e
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_s390.deb Size/MD5 checksum: 64385860 98ded86952a2c6714ceba76a4a98c35b
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_sparc.deb Size/MD5 checksum: 63621854 f0dd17453bc09fdc05c119faf2212d70
http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_sparc.deb Size/MD5 checksum: 3499170 3f2084d6416459ce1416bd6f6f2845e3
These files will probably be moved into the stable distribution on its next update.
For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAksjbAYACgkQNxpp46476aqm7wCaAk6WARfBzzrdYYoxAUKA5weL V5YAmwRkz4XNwdcqnPzdeDzoakljqf1s =DBEQ -----END PGP SIGNATURE-----
Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . =========================================================== Ubuntu Security Notice USN-822-1 August 24, 2009 kde4libs, kdelibs vulnerabilities CVE-2009-0945, CVE-2009-1687, CVE-2009-1690, CVE-2009-1698 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS: kdelibs4c2a 4:3.5.10-0ubuntu1~hardy1.2
Ubuntu 8.10: kdelibs4c2a 4:3.5.10-0ubuntu6.1 kdelibs5 4:4.1.4-0ubuntu1~intrepid1.2
Ubuntu 9.04: kdelibs4c2a 4:3.5.10.dfsg.1-1ubuntu8.1 kdelibs5 4:4.2.2-0ubuntu5.1
After a standard system upgrade you need to restart your session to effect the necessary changes.
Details follow:
It was discovered that KDE-Libs did not properly handle certain malformed SVG images. This issue only affected Ubuntu 9.04. (CVE-2009-0945)
It was discovered that the KDE JavaScript garbage collector did not properly handle memory allocation failures. (CVE-2009-1687)
It was discovered that KDE-Libs did not properly handle HTML content in the head element. (CVE-2009-1690)
It was discovered that KDE-Libs did not properly handle the Cascading Style Sheets (CSS) attr function call. (CVE-2009-1698)
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.diff.gz
Size/MD5: 1809719 988ba0b3fcdebaacd489ef624af90d52
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.dsc
Size/MD5: 1729 c2ba26fd1969292837be77339835463e
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.orig.tar.gz
Size/MD5: 18631467 5eeb6f132e386668a0395d4d426d495e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu1~hardy1.2_all.deb
Size/MD5: 7326386 15016f77751a853d96fbc549bdd0a487
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu1~hardy1.2_all.deb
Size/MD5: 25454764 b8e521c8bfc228667701baad29f9ea0b
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2_all.deb
Size/MD5: 9322 8a87b3a4fed9f227bb9e2eb0c0cd4829
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_amd64.deb
Size/MD5: 26758194 806e9679c84113d44a6fdcb3827e22b6
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_amd64.deb
Size/MD5: 1381550 739025e9a5f87b174b1b099b8c1f3e4f
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_amd64.deb
Size/MD5: 10654972 04e9b1429bb914d202bfedfc652dab2f
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_i386.deb
Size/MD5: 25990732 a09812c65c6e8d93ed21591cee340396
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_i386.deb
Size/MD5: 1410600 4f6d363ac598ecf83ab910e920cb08b0
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_i386.deb
Size/MD5: 9614618 de2bdf46fa444443af067acdb288d758
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_lpia.deb
Size/MD5: 25971080 5073531043650dac33a01175fd9ba304
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_lpia.deb
Size/MD5: 1375956 fbcbdc659fc44128a4bf37afdc3d466b
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_lpia.deb
Size/MD5: 9642602 904999dc74b11f078c50b9798be80b41
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_powerpc.deb
Size/MD5: 27656762 88ea3f12cee10e81fe212f604697ee87
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_powerpc.deb
Size/MD5: 1393490 7b6d787cba530e950ac4e783693cbce9
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_powerpc.deb
Size/MD5: 10453190 a09dadf79f488712a21d49a829e26c79
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_sparc.deb
Size/MD5: 25026168 a2066fad04e4b92cb4374a10f3ca4912
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_sparc.deb
Size/MD5: 1376552 ca7b84a5ea9c36ca36d51b113335ab70
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_sparc.deb
Size/MD5: 9596082 29426bec2f7943549b046d8aced4172d
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.diff.gz
Size/MD5: 94086 bca07843a8dbb43504199cf28f5e5e66
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.dsc
Size/MD5: 2308 42bc5a6639b095c402aa1336159b958a
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4.orig.tar.gz
Size/MD5: 11190299 18264580c1d6d978a3049a13fda36f29
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.diff.gz
Size/MD5: 720448 8dc9da15189485cac9374322825bccbc
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.dsc
Size/MD5: 2284 e99a996b350144fdf4bef83e6f339ce5
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.orig.tar.gz
Size/MD5: 18631467 5eeb6f132e386668a0395d4d426d495e
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.1.4-0ubuntu1~intrepid1.2_all.deb
Size/MD5: 3110640 8abefbf8d9f4c168a645761589c2935e
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-doc_4.1.4-0ubuntu1~intrepid1.2_all.deb
Size/MD5: 68582 86eda9548527b86c791c29789ed7fe28
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu6.1_all.deb
Size/MD5: 7321518 162272e6155b3cd9f3ea08c566b80e5b
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu6.1_all.deb
Size/MD5: 25522224 a0ce548bf6862e68285df52ac391c429
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1_all.deb
Size/MD5: 2270 650ab9bbf7f9748a9344495da23a2c82
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 395434 02fdee1fed9ff829a045d3785730d2fd
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 66055728 a8c41d8a9dc4e540a2c7d0c8199799a4
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 1440484 79881c87f9bd56d377790807842c3dcb
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_amd64.deb
Size/MD5: 10104606 421e72c07c231a7a68bcbca2c8069062
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_amd64.deb
Size/MD5: 27376386 59c3b6c1110365d63e1da80c363b96da
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_amd64.deb
Size/MD5: 1371456 f25f7f7b7fbc0c99df8ca1f2e734a64c
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_amd64.deb
Size/MD5: 10929852 e55ab2261280a73df4d75b9a0112ec87
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 371576 68138ccb311714315e34a88645c29b33
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 65218012 5fd7fa06fa0d28c98f75c58b3c8130ee
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 1437924 c1df5e2b5b8aa17774b23e651b9a88ee
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_i386.deb
Size/MD5: 9524338 f0a135714a94aefab44f7380a40e967f
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_i386.deb
Size/MD5: 26665042 cf31490fcc88f793c5ea6175b29b4df3
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_i386.deb
Size/MD5: 1404872 d383c99760eb1c92ab22a52bd6f33d4e
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_i386.deb
Size/MD5: 10144008 7e596d9e1464e5d016f674fb5d73b869
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 376410 ffc3b92e989c2a301559ebeea2f03d6e
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 65334318 d54fd6082a0ab4c1d324759379674b3d
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 1440518 01b987ef5588a94e82dbffa4f5afd1a1
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_lpia.deb
Size/MD5: 9536660 c3369e8abf325a91ab192e1349c3ecb2
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_lpia.deb
Size/MD5: 26674802 9de5792962f3c0bb21358f44aa000267
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_lpia.deb
Size/MD5: 1368306 b21739dc8c80f55ce0205efcdd2f2e08
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_lpia.deb
Size/MD5: 10141386 ee45606aa19cc8ceaeb73c5d4e6048c5
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 422856 6467cb43fcd16c4d6db7ff5053aaec1b
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 69277942 6820294b0c9505435fbff224c1a4f4f2
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 1445424 99b6afac70dead785c3211a9e92516f6
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb
Size/MD5: 10239400 be1872cf9859bf46176a2d485584134f
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_powerpc.deb
Size/MD5: 28217616 c2360441a42e8b9d8b91120b38d8ba51
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_powerpc.deb
Size/MD5: 1380892 2841eff5fc2a0a50227ca9a8d34c0a3b
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_powerpc.deb
Size/MD5: 10748632 f6e7de17cd38ee62c1f082a4fb218949
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 381184 1718118e08731a9690a5ce00f0c9f88b
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 64515916 f380c0a0865f4dbaad6b7e2d22d93294
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 1437568 14c1a84e7a518b443b0e851ef41f9ada
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_sparc.deb
Size/MD5: 9653946 803926ff9f9cc59a2f728d1aef8affbd
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_sparc.deb
Size/MD5: 25440578 311423fbaa788d51978e7857010c9242
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_sparc.deb
Size/MD5: 1368492 d4364357c5450b07aca1aa8981d96290
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_sparc.deb
Size/MD5: 9800480 4dc89a5d63ce16463a822f16fb82f3d7
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.diff.gz
Size/MD5: 102579 71b53faad8570c6ad92c0fc5e6aa4dfb
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.dsc
Size/MD5: 2305 558c2bdbbdb899c71197683df45fc75d
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2.orig.tar.gz
Size/MD5: 12335659 83d6a0d59e79873bbe0a5a90ef23f27e
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.diff.gz
Size/MD5: 724421 c73109ccdfb1d6c01eda7b6c0b4934a2
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.dsc
Size/MD5: 2342 8ee55c88b43902a23d127d14917511be
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1.orig.tar.gz
Size/MD5: 18639393 4bcfee29b0f939415791f5032a72e7b0
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.2.2-0ubuntu5.1_all.deb
Size/MD5: 1991468 99747c4c57d32b9d7477ff0c418cbd1b
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10.dfsg.1-1ubuntu8.1_all.deb
Size/MD5: 6751880 d7dfaf8fc4b8e658722a2beaaa3403d6
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1_all.deb
Size/MD5: 2272 fcf90c11a73566f41fd0eb5b54c4ee8f
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 280594 b0ccdd311755d4d73e4ae5c14b749c41
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 44148058 a7db92bd1bcf982314b0b89c1651a39b
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 1091210 b5430381f4c37424295eed580303a58c
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 7069750 e38c9e852339ef6c2134421765ed4eeb
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 102446 4370939a24e6e0783da79e4781a63b33
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_amd64.deb
Size/MD5: 611834 f61383e1830f92ed8ce2331ce4b8a366
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb
Size/MD5: 27110136 a617a5b148e5e78f3b8523198869c8b0
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb
Size/MD5: 1360082 d22364103ba04d238e9c6ce6632132c4
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb
Size/MD5: 10782444 6fea32d8dd41bfae44c2c6392e74928d
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 268936 55d68e9bbd600e288721479d2b90e16e
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 43456236 4fe778549740544eb1304cfba184d899
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 1090396 db9306ddd8d1029b523ef398cb0acfcb
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 6775516 374ea41072ec5221589c5f022f648434
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 126910 e4dbfd8386ea15fb613d7d56c971fd5e
http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_i386.deb
Size/MD5: 569616 b83e42d5f01e5e64ebb376820855771d
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_i386.deb
Size/MD5: 26382844 e88d283fb997e17aa96e8d7b0d6ca41e
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_i386.deb
Size/MD5: 1394762 97bb37a8d0c8d60e278b671e14ee678b
http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_i386.deb
Size/MD5: 10006808 1e023a799c01aa6826ec770afbd68c90
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 275124 9779e3644ebfe8d78b7a4e3ffbf911f1
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 43588032 45eed1b291e0bd64bbbbbb3310d0f627
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 1092816 f7f13887c87e7ff27ae68785010e6720
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 6849342 b864a2c9fa03c050581a3102194adc1b
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 102444 7fee9a94b561c3fc03eac8de41b9ced5
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_lpia.deb
Size/MD5: 599800 9a75c9c7a63848de9c911e45370556e4
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb
Size/MD5: 26385234 73d6c254de10b86ee1c4e042ad6af402
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb
Size/MD5: 1356828 d361a888c74d0c508876404cbcad4af5
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb
Size/MD5: 10020040 4f9bc1c45c3dd04185de146cb1d1f4fd
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 269632 341b2a4e4e1dc63aa429a525ac5a2cd4
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 43129040 2288d1735b6c017024e04702626a139d
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 1089846 b7ce576938df67875e4cd0e61c86f9cd
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 6201830 fa9f8330ab5390563e78f2dbdce2e3e5
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 102426 1cc244e9262435b1779586108b2388af
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_powerpc.deb
Size/MD5: 554306 bc91379d58e2cc610671b092fcacbeb5
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb
Size/MD5: 27928600 45b14e2a27fba6bd686880d8db9df586
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb
Size/MD5: 1369304 3d402371b107efa1a35551ebf4d5b502
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb
Size/MD5: 10611572 a85ed7be116a175427d9da3ab4d1325f
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 249574 e2e1b89231e89f4756c5abf11fc3f336
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 40331324 5505211faa8ff8b08be22e533dd49dff
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 1086200 4f8049b2f341873fd26ecb2b03b1ba21
http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 5941632 a62ca018afa73d9d42feabd7cd12e534
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 102468 6e6a2473358e87b7866b4844659d5a85
http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_sparc.deb
Size/MD5: 529504 cc978af233ef52e1211e52ad00199cb0
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb
Size/MD5: 25158764 020573ace30e4a179891aec0abe60149
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb
Size/MD5: 1356898 a5c04c3bfce3e79bac6ad5be6b97e212
http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb
Size/MD5: 9662850 c7a7204aede16a1951ec1af8a26b4d1c
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200905-0505",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "safari",
"scope": "eq",
"trust": 1.3,
"vendor": "apple",
"version": "3.1.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.3,
"vendor": "apple",
"version": "3.1.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.3,
"vendor": "apple",
"version": "3.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.3,
"vendor": "apple",
"version": "3.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.3,
"vendor": "apple",
"version": "3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.1.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "0.9"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.0b1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.3.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.0b2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0.4"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.3.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0.4"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.4"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.3.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.5"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.2.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.0.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.3"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.2"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "4.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "2.0.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.2.0"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "0.8"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.2.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "safari",
"scope": "eq",
"trust": 1.0,
"vendor": "apple",
"version": "3.1.0"
},
{
"model": "safari",
"scope": "lte",
"trust": 1.0,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.6"
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.7"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.4.11"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5 to v10.5.6"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.7"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "1.0 to 2.2.1"
},
{
"model": "ios for ipod touch",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "1.1 to 2.2.1"
},
{
"model": "safari",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "3.2.3"
},
{
"model": "safari",
"scope": "lt",
"trust": 0.8,
"vendor": "apple",
"version": "4 public beta"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"model": "rhel optional productivity applications",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"model": "rhel optional productivity applications eus",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.3.z (server)"
},
{
"model": "safari",
"scope": null,
"trust": 0.7,
"vendor": "apple",
"version": null
},
{
"model": "mac os x",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "mac os x server",
"scope": "eq",
"trust": 0.6,
"vendor": "apple",
"version": "10.4.11"
},
{
"model": "open source project webkit",
"scope": "eq",
"trust": 0.3,
"vendor": "webkit",
"version": "0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"model": "qt",
"scope": "eq",
"trust": 0.3,
"vendor": "trolltech",
"version": "4.4.3"
},
{
"model": "qt",
"scope": "eq",
"trust": 0.3,
"vendor": "trolltech",
"version": "4.5"
},
{
"model": "enterprise linux optional productivity application server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "enterprise linux desktop workstation client",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5"
},
{
"model": "hat enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "pardus",
"version": "20080"
},
{
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2009.1"
},
{
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2009.1"
},
{
"model": "corporate server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "corporate server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "4.0"
},
{
"model": "kdegraphics",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "3.5.4"
},
{
"model": "kde",
"scope": "eq",
"trust": 0.3,
"vendor": "kde",
"version": "4.2.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.3.1549"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.36"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux armel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux armel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"model": "safari for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.2"
},
{
"model": "safari for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1.2"
},
{
"model": "safari for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1.1"
},
{
"model": "safari beta for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.4"
},
{
"model": "safari beta for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.3"
},
{
"model": "safari beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.3"
},
{
"model": "safari beta for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.2"
},
{
"model": "safari beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.2"
},
{
"model": "safari beta for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.1"
},
{
"model": "safari beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.0.1"
},
{
"model": "safari beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "4"
},
{
"model": "safari for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3.1"
},
{
"model": "safari beta for windows",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3"
},
{
"model": "safari beta",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2.1"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.4"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.3"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.2"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "ipod touch",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.4"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.3"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.0.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.2"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "2.0"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1.1"
},
{
"model": "iphone",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "1"
},
{
"model": "chrome",
"scope": "ne",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.65"
},
{
"model": "safari for windows",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.3"
},
{
"model": "safari",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "3.2.3"
},
{
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"model": "ipod touch",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "3.0"
},
{
"model": "iphone",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "3.0"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "BID",
"id": "34924"
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:iphone_os",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:iphone_os_for_ipod_touch",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:apple:safari",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:redhat:rhel_optional_productivity_applications",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:redhat:rhel_optional_productivity_applications_eus",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Nils",
"sources": [
{
"db": "ZDI",
"id": "ZDI-09-022"
}
],
"trust": 0.7
},
"cve": "CVE-2009-0945",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "CVE-2009-0945",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-38391",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2009-0945",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2009-0945",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200905-181",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-38391",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption. WebKit of insertItemBefore Methods include SVGPathList A vulnerability exists in the execution of arbitrary code due to flaws in the processing of documents with data structures.A third party may execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.The specific flaw exists during the parsing of malformed SVGLists via the SVGPathList data structure, the following lists are affected: SVGTransformList, SVGStringList, SVGNumberList, SVGPathSegList, SVGPointList, SVGLengthList. When a negative index argument is suppled to the insertItemBefore() method, a memory corruption occurs resulting in the ability to execute arbitrary code. WebKit is prone to a remote memory-corruption vulnerability. Failed exploit attempts will result in a denial-of-service condition. \nThe issue also affects the following:\nApple Safari prior to 3.2.3\nApple Mac OS X v10.5 through v10.5.6,\nApple Mac OS X Server v10.5 through v10.5.6\nGoogle Chrome prior to 1.0.154.65. Safari is the web browser bundled by default in the Apple operating system. There is a memory corruption vulnerability in the processing of SVGList objects in WebKit in Safari. Safari has multiple input validation errors in its handling of the feed: URL, and accessing a malicious feed: URL can lead to arbitrary JavaScript execution. NOTE: the\n JBIG2Stream.cxx vector may overlap CVE-2009-1179. (CVE-2009-0791). (CVE-2009-1709). \n \n This update provides a solution to this vulnerability. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709\n _______________________________________________________________________\n\n Updated Packages:\n\n Corporate 4.0:\n 0ec7bf7b568cd017c976b581046a4665 corporate/4.0/i586/kdegraphics-3.5.4-0.9.20060mlcs4.i586.rpm\n 32bf2180033208d0d7fb98a1670f76ef corporate/4.0/i586/kdegraphics-common-3.5.4-0.9.20060mlcs4.i586.rpm\n fc4d07f38b7c38a41924a87d1da87a7b corporate/4.0/i586/kdegraphics-kcolorchooser-3.5.4-0.9.20060mlcs4.i586.rpm\n 60ac7ec91991f24378608445602156b4 corporate/4.0/i586/kdegraphics-kcoloredit-3.5.4-0.9.20060mlcs4.i586.rpm\n e23a46f8928ff9bf43dfb85d030d66f4 corporate/4.0/i586/kdegraphics-kdvi-3.5.4-0.9.20060mlcs4.i586.rpm\n 0da4d8567fd0102fa3b71e14d7e77cce corporate/4.0/i586/kdegraphics-kfax-3.5.4-0.9.20060mlcs4.i586.rpm\n 71e5fc67191644df05dc3eeaf3eea182 corporate/4.0/i586/kdegraphics-kghostview-3.5.4-0.9.20060mlcs4.i586.rpm\n 5f712336e95e534ee5438bd6b601a6d5 corporate/4.0/i586/kdegraphics-kiconedit-3.5.4-0.9.20060mlcs4.i586.rpm\n b37b6097ac674ebc3296125ed1c33615 corporate/4.0/i586/kdegraphics-kolourpaint-3.5.4-0.9.20060mlcs4.i586.rpm\n d873b5de956fa6f936135a0046387bf1 corporate/4.0/i586/kdegraphics-kooka-3.5.4-0.9.20060mlcs4.i586.rpm\n 2474e300ccd833db71a756b34d9fec94 corporate/4.0/i586/kdegraphics-kpdf-3.5.4-0.9.20060mlcs4.i586.rpm\n 0454ff14fce7eda256890967555693bb corporate/4.0/i586/kdegraphics-kpovmodeler-3.5.4-0.9.20060mlcs4.i586.rpm\n bd79021aab7f406657774da069cc677d corporate/4.0/i586/kdegraphics-kruler-3.5.4-0.9.20060mlcs4.i586.rpm\n 5ab29c519209bc802613729896d84c63 corporate/4.0/i586/kdegraphics-ksnapshot-3.5.4-0.9.20060mlcs4.i586.rpm\n 771cf8aa682b615babcc8748cc09f4a9 corporate/4.0/i586/kdegraphics-ksvg-3.5.4-0.9.20060mlcs4.i586.rpm\n 1445a204c7aa0dae1eefab7b0d5f5839 corporate/4.0/i586/kdegraphics-kuickshow-3.5.4-0.9.20060mlcs4.i586.rpm\n fbd113f1442541e0cb05b624a2e08c74 corporate/4.0/i586/kdegraphics-kview-3.5.4-0.9.20060mlcs4.i586.rpm\n 94dec05663eb9499d974ba3d6b14e885 corporate/4.0/i586/kdegraphics-mrmlsearch-3.5.4-0.9.20060mlcs4.i586.rpm\n 86ca6e187a798897c25d5c9a66112b96 corporate/4.0/i586/libkdegraphics0-common-3.5.4-0.9.20060mlcs4.i586.rpm\n ed07099f0f6983c87188cd7cbe6fa4f5 corporate/4.0/i586/libkdegraphics0-common-devel-3.5.4-0.9.20060mlcs4.i586.rpm\n 978a543e6af07842a0facab486419848 corporate/4.0/i586/libkdegraphics0-kghostview-3.5.4-0.9.20060mlcs4.i586.rpm\n 9a7f4cf394eda5f91fe2d288bf6f6248 corporate/4.0/i586/libkdegraphics0-kghostview-devel-3.5.4-0.9.20060mlcs4.i586.rpm\n c47855bb4af164237de071eca478b852 corporate/4.0/i586/libkdegraphics0-kooka-3.5.4-0.9.20060mlcs4.i586.rpm\n 61361d801c9e0bfc677147a0ebed83cc corporate/4.0/i586/libkdegraphics0-kooka-devel-3.5.4-0.9.20060mlcs4.i586.rpm\n 78333238aa1949fbd32f4bbe17587819 corporate/4.0/i586/libkdegraphics0-kpovmodeler-3.5.4-0.9.20060mlcs4.i586.rpm\n cd42ba63d5df96750d5e0b65662a16c7 corporate/4.0/i586/libkdegraphics0-kpovmodeler-devel-3.5.4-0.9.20060mlcs4.i586.rpm\n 45077a5366e72fd55f7ddf819ce087f9 corporate/4.0/i586/libkdegraphics0-ksvg-3.5.4-0.9.20060mlcs4.i586.rpm\n efbe90c91e2762073332c0994bdf0349 corporate/4.0/i586/libkdegraphics0-ksvg-devel-3.5.4-0.9.20060mlcs4.i586.rpm\n 4acdcf255082a2bb7328a4ac805dbcaa corporate/4.0/i586/libkdegraphics0-kview-3.5.4-0.9.20060mlcs4.i586.rpm\n fddafb351cdd4da03e33f08d4af73622 corporate/4.0/i586/libkdegraphics0-kview-devel-3.5.4-0.9.20060mlcs4.i586.rpm \n 64deef0a4a406a04f476f5263478d2e3 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.9.20060mlcs4.src.rpm\n\n Corporate 4.0/X86_64:\n 0fd67ad8a003f2cc7b4b5b0f295af59e corporate/4.0/x86_64/kdegraphics-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 1e62299bf29230174331f43de7215366 corporate/4.0/x86_64/kdegraphics-common-3.5.4-0.9.20060mlcs4.x86_64.rpm\n a9c5b4e3f0db3db937261c8f504c44ca corporate/4.0/x86_64/kdegraphics-kcolorchooser-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 0c0cfaf7fb1fe22bac1740425df135b2 corporate/4.0/x86_64/kdegraphics-kcoloredit-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 9e961f83cdc9734007f9d5a90f4c888c corporate/4.0/x86_64/kdegraphics-kdvi-3.5.4-0.9.20060mlcs4.x86_64.rpm\n a7a5204dadd20443f879cc696906ed70 corporate/4.0/x86_64/kdegraphics-kfax-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 1bfb78ecd8e44dc61c48dad786238bad corporate/4.0/x86_64/kdegraphics-kghostview-3.5.4-0.9.20060mlcs4.x86_64.rpm\n ddf5c19dbfcc64bb227173cb331dd661 corporate/4.0/x86_64/kdegraphics-kiconedit-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 3b77da395b388a38a39805244ffb45dc corporate/4.0/x86_64/kdegraphics-kolourpaint-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 52a4a93e2655edafc36d2e75c4adacb0 corporate/4.0/x86_64/kdegraphics-kooka-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 6f4cdfee02441d22543b93252023490c corporate/4.0/x86_64/kdegraphics-kpdf-3.5.4-0.9.20060mlcs4.x86_64.rpm\n e7351156f775cda56b9a026d6d230b66 corporate/4.0/x86_64/kdegraphics-kpovmodeler-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 54062812371d272f1f7115143d750d18 corporate/4.0/x86_64/kdegraphics-kruler-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 7967101313636798c9e67d7d6d9f7e8e corporate/4.0/x86_64/kdegraphics-ksnapshot-3.5.4-0.9.20060mlcs4.x86_64.rpm\n db3dc6a00c46848ae9a31f8db2adb76b corporate/4.0/x86_64/kdegraphics-ksvg-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 7bf017292f4ea7eb0007e30ee5f7ea06 corporate/4.0/x86_64/kdegraphics-kuickshow-3.5.4-0.9.20060mlcs4.x86_64.rpm\n ea3a9b102557f7b71e5988b11812fb9d corporate/4.0/x86_64/kdegraphics-kview-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 49ce4f2918d3ca3a726f157db4e326ff corporate/4.0/x86_64/kdegraphics-mrmlsearch-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 37962c005b21c9f034168193ac143686 corporate/4.0/x86_64/lib64kdegraphics0-common-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 78bc99fdf48570c57b8d8e04578d0b0f corporate/4.0/x86_64/lib64kdegraphics0-common-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm\n f2627650fccc5194666844f18ff6a2e9 corporate/4.0/x86_64/lib64kdegraphics0-kghostview-3.5.4-0.9.20060mlcs4.x86_64.rpm\n d6031ac8e48c554df0456a5c6ca25a6c corporate/4.0/x86_64/lib64kdegraphics0-kghostview-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm\n e485c792b85edd25c29025900c71d9a5 corporate/4.0/x86_64/lib64kdegraphics0-kooka-3.5.4-0.9.20060mlcs4.x86_64.rpm\n c9d19e68cc7d9b1c17fce9f572c063d7 corporate/4.0/x86_64/lib64kdegraphics0-kooka-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm\n c984a53011f393d7cbb6f2cc0774efa3 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 8d1c6a2c8eaf161632f5a333bd1639d8 corporate/4.0/x86_64/lib64kdegraphics0-kpovmodeler-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 0f066ee3e189779638a4c5d7c6d08b78 corporate/4.0/x86_64/lib64kdegraphics0-ksvg-3.5.4-0.9.20060mlcs4.x86_64.rpm\n 7efa7c6905de7b624e95ea8ba16088d8 corporate/4.0/x86_64/lib64kdegraphics0-ksvg-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm\n e407dc0360d9108ce56b58b0bbce8d7e corporate/4.0/x86_64/lib64kdegraphics0-kview-3.5.4-0.9.20060mlcs4.x86_64.rpm\n a1227e9c72b228994582c91678763e1e corporate/4.0/x86_64/lib64kdegraphics0-kview-devel-3.5.4-0.9.20060mlcs4.x86_64.rpm \n 64deef0a4a406a04f476f5263478d2e3 corporate/4.0/SRPMS/kdegraphics-3.5.4-0.9.20060mlcs4.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFLIQ2nmqjQ0CJFipgRAtveAKDD76Mn1SvVN71DMEESnFqN7Qk5+wCdGGMa\nH2tf9QJ8H8rPmPybWHl8Yxs=\n=DMWI\n-----END PGP SIGNATURE-----\n. (CVE-2009-0945)\n\nSeveral flaws were discovered in the QtWebKit browser and JavaScript\nengines. (CVE-2009-1699, CVE-2009-1713)\n\nIt was discovered that QtWebKit did not prevent the loading of local Java\napplets. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- ------------------------------------------------------------------------\nDebian Security Advisory DSA-1950 security@debian.org\nhttp://www.debian.org/security/ Giuseppe Iuculano\nDecember 12, 2009 http://www.debian.org/security/faq\n- ------------------------------------------------------------------------\n\nPackage : webkit\nVulnerability : several\nProblem type : remote (local)\nDebian-specific: no\nCVE Id : CVE-2009-0945 CVE-2009-1687 CVE-2009-1690 CVE-2009-1698\n CVE-2009-1711 CVE-2009-1712 CVE-2009-1725 CVE-2009-1714\n CVE-2009-1710 CVE-2009-1697 CVE-2009-1695 CVE-2009-1693\n CVE-2009-1694 CVE-2009-1681 CVE-2009-1684 CVE-2009-1692\nDebian Bug : 532724 532725 534946 535793 538346\n\n\nSeveral vulnerabilities have been discovered in webkit, a Web content engine\nlibrary for Gtk+. \n\n\nCVE-2009-1711\n\nWebKit does not properly initialize memory for Attr DOM objects, which allows\nremote attackers to execute arbitrary code or cause a denial of service\n(application crash) via a crafted HTML document. \n\n\nCVE-2009-1725\n\nWebKit do not properly handle numeric character references, which allows remote\nattackers to execute arbitrary code or cause a denial of service (memory\ncorruption and application crash) via a crafted HTML document. \n\n\nCVE-2009-1714\n\nCross-site scripting (XSS) vulnerability in Web Inspector in WebKit allows\nuser-assisted remote attackers to inject arbitrary web script or HTML, and read\nlocal files, via vectors related to the improper escaping of HTML attributes. \n\n\nCVE-2009-1710\n\nWebKit allows remote attackers to spoof the browser\u0027s display of the host name,\nsecurity indicators, and unspecified other UI elements via a custom cursor in\nconjunction with a modified CSS3 hotspot property. \n\n\nCVE-2009-1697\n\nCRLF injection vulnerability in WebKit allows remote attackers to inject HTTP\nheaders and bypass the Same Origin Policy via a crafted HTML document, related\nto cross-site scripting (XSS) attacks that depend on communication with\narbitrary web sites on the same server through use of XMLHttpRequest without a\nHost header. \n\n\nCVE-2009-1695\n\nCross-site scripting (XSS) vulnerability in WebKit allows remote attackers to\ninject arbitrary web script or HTML via vectors involving access to frame\ncontents after completion of a page transition. \n\n\nCVE-2009-1693\n\nWebKit allows remote attackers to read images from arbitrary web sites via a\nCANVAS element with an SVG image, related to a \"cross-site image capture issue.\"\n\n\nCVE-2009-1694\n\nWebKit does not properly handle redirects, which allows remote attackers to read\nimages from arbitrary web sites via vectors involving a CANVAS element and\nredirection, related to a \"cross-site image capture issue.\"\n\n\nCVE-2009-1681\n\nWebKit does not prevent web sites from loading third-party content into a\nsubframe, which allows remote attackers to bypass the Same Origin Policy and\nconduct \"clickjacking\" attacks via a crafted HTML document. \n\n\nCVE-2009-1684\n\nCross-site scripting (XSS) vulnerability in WebKit allows remote attackers to\ninject arbitrary web script or HTML via an event handler that triggers script\nexecution in the context of the next loaded document. \n\n\nCVE-2009-1692\n\nWebKit allows remote attackers to cause a denial of service (memory consumption\nor device reset) via a web page containing an HTMLSelectElement object with a\nlarge length attribute, related to the length property of a Select object. \n\n\n\nFor the stable distribution (lenny), these problems has been fixed in\nversion 1.0.1-4+lenny2. \n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems have been fixed in version 1.1.16-1. \n\n\nWe recommend that you upgrade your webkit package. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nDebian (stable)\n- ---------------\n\nStable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64,\nmips, mipsel, powerpc, s390 and sparc. \n\nSource archives:\n\n http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1.orig.tar.gz\n Size/MD5 checksum: 13418752 4de68a5773998bea14e8939aa341c466\n\nhttp://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.diff.gz\n Size/MD5 checksum: 35369 506c8f2fef73a9fc856264f11a3ad27e\n http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.dsc\n Size/MD5 checksum: 1447 b5f01d6428f01d79bfe18338064452ab\n\nArchitecture independent packages:\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-dev_1.0.1-4+lenny2_all.deb\n Size/MD5 checksum: 35164 df682bbcd13389c2f50002c2aaf7347b\n\nalpha architecture (DEC Alpha)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_alpha.deb\n Size/MD5 checksum: 65193740 fc8b613c9c41ef0f0d3856e7ee3deeae\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_alpha.deb\n Size/MD5 checksum: 4254938 252b95b962bda11c000f9c0543673c1b\n\namd64 architecture (AMD x86_64 (AMD64))\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_amd64.deb\n Size/MD5 checksum: 3502994 4a96cad1e302e7303d41d6f866215da4\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_amd64.deb\n Size/MD5 checksum: 62518476 d723a8c76b373026752b6f68e5fc4950\n\narm architecture (ARM)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_arm.deb\n Size/MD5 checksum: 2721324 1fac2f59ffa9e3d7b8697aae262f09e4\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_arm.deb\n Size/MD5 checksum: 61478724 260faea7d5ba766268faad888b3e61ff\n\narmel architecture (ARM EABI)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_armel.deb\n Size/MD5 checksum: 2770654 5b88754e9804d9290537afdf6127643a\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_armel.deb\n Size/MD5 checksum: 59892062 99c8f13257a054f42686ab9c6329d490\n\nhppa architecture (HP PA RISC)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_hppa.deb\n Size/MD5 checksum: 3869020 c61be734b6511788e8cc235a5d672eab\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_hppa.deb\n Size/MD5 checksum: 63935342 f1db2bd7b5c22e257c74100798017f30\n\ni386 architecture (Intel ia32)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_i386.deb\n Size/MD5 checksum: 62161744 f89fc6ac6d1110cabe47dd9184c9a9ca\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_i386.deb\n Size/MD5 checksum: 3016584 b854f5294527adac80e9776efed37cd7\n\nia64 architecture (Intel ia64)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_ia64.deb\n Size/MD5 checksum: 5547624 2bd2100a345089282117317a9ab2e7d1\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_ia64.deb\n Size/MD5 checksum: 62685224 5eaff5d431cf4a85beeaa0b66c91958c\n\nmips architecture (MIPS (Big Endian))\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mips.deb\n Size/MD5 checksum: 3109134 a680a8f105a19bf1b21a5034c14c4822\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mips.deb\n Size/MD5 checksum: 64547832 dd440891a1861262bc92deb0a1ead013\n\nmipsel architecture (MIPS (Little Endian))\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mipsel.deb\n Size/MD5 checksum: 2992848 952d643be475c35e253a8757075cd41b\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mipsel.deb\n Size/MD5 checksum: 62135970 7cd635047e3f9bd000ff4547a47eaaec\n\ns390 architecture (IBM S/390)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_s390.deb\n Size/MD5 checksum: 3456914 6fc856a50b3f899c36381ed8d51af44e\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_s390.deb\n Size/MD5 checksum: 64385860 98ded86952a2c6714ceba76a4a98c35b\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_sparc.deb\n Size/MD5 checksum: 63621854 f0dd17453bc09fdc05c119faf2212d70\n\nhttp://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_sparc.deb\n Size/MD5 checksum: 3499170 3f2084d6416459ce1416bd6f6f2845e3\n\n\n These files will probably be moved into the stable distribution on\n its next update. \n\n- ---------------------------------------------------------------------------------\nFor apt-get: deb http://security.debian.org/ stable/updates main\nFor dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main\nMailing list: debian-security-announce@lists.debian.org\nPackage info: `apt-cache show \u003cpkg\u003e\u0027 and http://packages.debian.org/\u003cpkg\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAksjbAYACgkQNxpp46476aqm7wCaAk6WARfBzzrdYYoxAUKA5weL\nV5YAmwRkz4XNwdcqnPzdeDzoakljqf1s\n=DBEQ\n-----END PGP SIGNATURE-----\n\n_______________________________________________\nFull-Disclosure - We believe in it. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. ===========================================================\nUbuntu Security Notice USN-822-1 August 24, 2009\nkde4libs, kdelibs vulnerabilities\nCVE-2009-0945, CVE-2009-1687, CVE-2009-1690, CVE-2009-1698\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 8.04 LTS:\n kdelibs4c2a 4:3.5.10-0ubuntu1~hardy1.2\n\nUbuntu 8.10:\n kdelibs4c2a 4:3.5.10-0ubuntu6.1\n kdelibs5 4:4.1.4-0ubuntu1~intrepid1.2\n\nUbuntu 9.04:\n kdelibs4c2a 4:3.5.10.dfsg.1-1ubuntu8.1\n kdelibs5 4:4.2.2-0ubuntu5.1\n\nAfter a standard system upgrade you need to restart your session to effect\nthe necessary changes. \n\nDetails follow:\n\nIt was discovered that KDE-Libs did not properly handle certain malformed\nSVG images. This\nissue only affected Ubuntu 9.04. (CVE-2009-0945)\n\nIt was discovered that the KDE JavaScript garbage collector did not\nproperly handle memory allocation failures. (CVE-2009-1687)\n\nIt was discovered that KDE-Libs did not properly handle HTML content in the\nhead element. (CVE-2009-1690)\n\nIt was discovered that KDE-Libs did not properly handle the Cascading Style\nSheets (CSS) attr function call. (CVE-2009-1698)\n\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.diff.gz\n Size/MD5: 1809719 988ba0b3fcdebaacd489ef624af90d52\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.dsc\n Size/MD5: 1729 c2ba26fd1969292837be77339835463e\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.orig.tar.gz\n Size/MD5: 18631467 5eeb6f132e386668a0395d4d426d495e\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu1~hardy1.2_all.deb\n Size/MD5: 7326386 15016f77751a853d96fbc549bdd0a487\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu1~hardy1.2_all.deb\n Size/MD5: 25454764 b8e521c8bfc228667701baad29f9ea0b\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2_all.deb\n Size/MD5: 9322 8a87b3a4fed9f227bb9e2eb0c0cd4829\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_amd64.deb\n Size/MD5: 26758194 806e9679c84113d44a6fdcb3827e22b6\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_amd64.deb\n Size/MD5: 1381550 739025e9a5f87b174b1b099b8c1f3e4f\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_amd64.deb\n Size/MD5: 10654972 04e9b1429bb914d202bfedfc652dab2f\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_i386.deb\n Size/MD5: 25990732 a09812c65c6e8d93ed21591cee340396\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_i386.deb\n Size/MD5: 1410600 4f6d363ac598ecf83ab910e920cb08b0\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_i386.deb\n Size/MD5: 9614618 de2bdf46fa444443af067acdb288d758\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_lpia.deb\n Size/MD5: 25971080 5073531043650dac33a01175fd9ba304\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_lpia.deb\n Size/MD5: 1375956 fbcbdc659fc44128a4bf37afdc3d466b\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_lpia.deb\n Size/MD5: 9642602 904999dc74b11f078c50b9798be80b41\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_powerpc.deb\n Size/MD5: 27656762 88ea3f12cee10e81fe212f604697ee87\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_powerpc.deb\n Size/MD5: 1393490 7b6d787cba530e950ac4e783693cbce9\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_powerpc.deb\n Size/MD5: 10453190 a09dadf79f488712a21d49a829e26c79\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_sparc.deb\n Size/MD5: 25026168 a2066fad04e4b92cb4374a10f3ca4912\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_sparc.deb\n Size/MD5: 1376552 ca7b84a5ea9c36ca36d51b113335ab70\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_sparc.deb\n Size/MD5: 9596082 29426bec2f7943549b046d8aced4172d\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.diff.gz\n Size/MD5: 94086 bca07843a8dbb43504199cf28f5e5e66\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.dsc\n Size/MD5: 2308 42bc5a6639b095c402aa1336159b958a\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4.orig.tar.gz\n Size/MD5: 11190299 18264580c1d6d978a3049a13fda36f29\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.diff.gz\n Size/MD5: 720448 8dc9da15189485cac9374322825bccbc\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.dsc\n Size/MD5: 2284 e99a996b350144fdf4bef83e6f339ce5\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.orig.tar.gz\n Size/MD5: 18631467 5eeb6f132e386668a0395d4d426d495e\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.1.4-0ubuntu1~intrepid1.2_all.deb\n Size/MD5: 3110640 8abefbf8d9f4c168a645761589c2935e\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-doc_4.1.4-0ubuntu1~intrepid1.2_all.deb\n Size/MD5: 68582 86eda9548527b86c791c29789ed7fe28\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu6.1_all.deb\n Size/MD5: 7321518 162272e6155b3cd9f3ea08c566b80e5b\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu6.1_all.deb\n Size/MD5: 25522224 a0ce548bf6862e68285df52ac391c429\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1_all.deb\n Size/MD5: 2270 650ab9bbf7f9748a9344495da23a2c82\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_amd64.deb\n Size/MD5: 395434 02fdee1fed9ff829a045d3785730d2fd\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_amd64.deb\n Size/MD5: 66055728 a8c41d8a9dc4e540a2c7d0c8199799a4\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_amd64.deb\n Size/MD5: 1440484 79881c87f9bd56d377790807842c3dcb\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_amd64.deb\n Size/MD5: 10104606 421e72c07c231a7a68bcbca2c8069062\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_amd64.deb\n Size/MD5: 27376386 59c3b6c1110365d63e1da80c363b96da\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_amd64.deb\n Size/MD5: 1371456 f25f7f7b7fbc0c99df8ca1f2e734a64c\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_amd64.deb\n Size/MD5: 10929852 e55ab2261280a73df4d75b9a0112ec87\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_i386.deb\n Size/MD5: 371576 68138ccb311714315e34a88645c29b33\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_i386.deb\n Size/MD5: 65218012 5fd7fa06fa0d28c98f75c58b3c8130ee\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_i386.deb\n Size/MD5: 1437924 c1df5e2b5b8aa17774b23e651b9a88ee\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_i386.deb\n Size/MD5: 9524338 f0a135714a94aefab44f7380a40e967f\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_i386.deb\n Size/MD5: 26665042 cf31490fcc88f793c5ea6175b29b4df3\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_i386.deb\n Size/MD5: 1404872 d383c99760eb1c92ab22a52bd6f33d4e\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_i386.deb\n Size/MD5: 10144008 7e596d9e1464e5d016f674fb5d73b869\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_lpia.deb\n Size/MD5: 376410 ffc3b92e989c2a301559ebeea2f03d6e\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_lpia.deb\n Size/MD5: 65334318 d54fd6082a0ab4c1d324759379674b3d\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_lpia.deb\n Size/MD5: 1440518 01b987ef5588a94e82dbffa4f5afd1a1\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_lpia.deb\n Size/MD5: 9536660 c3369e8abf325a91ab192e1349c3ecb2\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_lpia.deb\n Size/MD5: 26674802 9de5792962f3c0bb21358f44aa000267\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_lpia.deb\n Size/MD5: 1368306 b21739dc8c80f55ce0205efcdd2f2e08\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_lpia.deb\n Size/MD5: 10141386 ee45606aa19cc8ceaeb73c5d4e6048c5\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb\n Size/MD5: 422856 6467cb43fcd16c4d6db7ff5053aaec1b\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb\n Size/MD5: 69277942 6820294b0c9505435fbff224c1a4f4f2\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb\n Size/MD5: 1445424 99b6afac70dead785c3211a9e92516f6\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb\n Size/MD5: 10239400 be1872cf9859bf46176a2d485584134f\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_powerpc.deb\n Size/MD5: 28217616 c2360441a42e8b9d8b91120b38d8ba51\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_powerpc.deb\n Size/MD5: 1380892 2841eff5fc2a0a50227ca9a8d34c0a3b\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_powerpc.deb\n Size/MD5: 10748632 f6e7de17cd38ee62c1f082a4fb218949\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_sparc.deb\n Size/MD5: 381184 1718118e08731a9690a5ce00f0c9f88b\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_sparc.deb\n Size/MD5: 64515916 f380c0a0865f4dbaad6b7e2d22d93294\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_sparc.deb\n Size/MD5: 1437568 14c1a84e7a518b443b0e851ef41f9ada\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_sparc.deb\n Size/MD5: 9653946 803926ff9f9cc59a2f728d1aef8affbd\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_sparc.deb\n Size/MD5: 25440578 311423fbaa788d51978e7857010c9242\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_sparc.deb\n Size/MD5: 1368492 d4364357c5450b07aca1aa8981d96290\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_sparc.deb\n Size/MD5: 9800480 4dc89a5d63ce16463a822f16fb82f3d7\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.diff.gz\n Size/MD5: 102579 71b53faad8570c6ad92c0fc5e6aa4dfb\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.dsc\n Size/MD5: 2305 558c2bdbbdb899c71197683df45fc75d\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2.orig.tar.gz\n Size/MD5: 12335659 83d6a0d59e79873bbe0a5a90ef23f27e\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.diff.gz\n Size/MD5: 724421 c73109ccdfb1d6c01eda7b6c0b4934a2\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.dsc\n Size/MD5: 2342 8ee55c88b43902a23d127d14917511be\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1.orig.tar.gz\n Size/MD5: 18639393 4bcfee29b0f939415791f5032a72e7b0\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.2.2-0ubuntu5.1_all.deb\n Size/MD5: 1991468 99747c4c57d32b9d7477ff0c418cbd1b\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10.dfsg.1-1ubuntu8.1_all.deb\n Size/MD5: 6751880 d7dfaf8fc4b8e658722a2beaaa3403d6\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1_all.deb\n Size/MD5: 2272 fcf90c11a73566f41fd0eb5b54c4ee8f\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 280594 b0ccdd311755d4d73e4ae5c14b749c41\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 44148058 a7db92bd1bcf982314b0b89c1651a39b\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 1091210 b5430381f4c37424295eed580303a58c\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 7069750 e38c9e852339ef6c2134421765ed4eeb\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 102446 4370939a24e6e0783da79e4781a63b33\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_amd64.deb\n Size/MD5: 611834 f61383e1830f92ed8ce2331ce4b8a366\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb\n Size/MD5: 27110136 a617a5b148e5e78f3b8523198869c8b0\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb\n Size/MD5: 1360082 d22364103ba04d238e9c6ce6632132c4\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb\n Size/MD5: 10782444 6fea32d8dd41bfae44c2c6392e74928d\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 268936 55d68e9bbd600e288721479d2b90e16e\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 43456236 4fe778549740544eb1304cfba184d899\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 1090396 db9306ddd8d1029b523ef398cb0acfcb\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 6775516 374ea41072ec5221589c5f022f648434\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 126910 e4dbfd8386ea15fb613d7d56c971fd5e\n http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_i386.deb\n Size/MD5: 569616 b83e42d5f01e5e64ebb376820855771d\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_i386.deb\n Size/MD5: 26382844 e88d283fb997e17aa96e8d7b0d6ca41e\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_i386.deb\n Size/MD5: 1394762 97bb37a8d0c8d60e278b671e14ee678b\n http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_i386.deb\n Size/MD5: 10006808 1e023a799c01aa6826ec770afbd68c90\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 275124 9779e3644ebfe8d78b7a4e3ffbf911f1\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 43588032 45eed1b291e0bd64bbbbbb3310d0f627\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 1092816 f7f13887c87e7ff27ae68785010e6720\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 6849342 b864a2c9fa03c050581a3102194adc1b\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 102444 7fee9a94b561c3fc03eac8de41b9ced5\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_lpia.deb\n Size/MD5: 599800 9a75c9c7a63848de9c911e45370556e4\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb\n Size/MD5: 26385234 73d6c254de10b86ee1c4e042ad6af402\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb\n Size/MD5: 1356828 d361a888c74d0c508876404cbcad4af5\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb\n Size/MD5: 10020040 4f9bc1c45c3dd04185de146cb1d1f4fd\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 269632 341b2a4e4e1dc63aa429a525ac5a2cd4\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 43129040 2288d1735b6c017024e04702626a139d\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 1089846 b7ce576938df67875e4cd0e61c86f9cd\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 6201830 fa9f8330ab5390563e78f2dbdce2e3e5\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 102426 1cc244e9262435b1779586108b2388af\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_powerpc.deb\n Size/MD5: 554306 bc91379d58e2cc610671b092fcacbeb5\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb\n Size/MD5: 27928600 45b14e2a27fba6bd686880d8db9df586\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb\n Size/MD5: 1369304 3d402371b107efa1a35551ebf4d5b502\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb\n Size/MD5: 10611572 a85ed7be116a175427d9da3ab4d1325f\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 249574 e2e1b89231e89f4756c5abf11fc3f336\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 40331324 5505211faa8ff8b08be22e533dd49dff\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 1086200 4f8049b2f341873fd26ecb2b03b1ba21\n http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 5941632 a62ca018afa73d9d42feabd7cd12e534\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 102468 6e6a2473358e87b7866b4844659d5a85\n http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_sparc.deb\n Size/MD5: 529504 cc978af233ef52e1211e52ad00199cb0\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb\n Size/MD5: 25158764 020573ace30e4a179891aec0abe60149\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb\n Size/MD5: 1356898 a5c04c3bfce3e79bac6ad5be6b97e212\n http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb\n Size/MD5: 9662850 c7a7204aede16a1951ec1af8a26b4d1c\n\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-0945"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "BID",
"id": "34924"
},
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "PACKETSTORM",
"id": "80577"
},
{
"db": "PACKETSTORM",
"id": "83707"
},
{
"db": "PACKETSTORM",
"id": "81589"
},
{
"db": "PACKETSTORM",
"id": "82662"
},
{
"db": "PACKETSTORM",
"id": "83759"
},
{
"db": "PACKETSTORM",
"id": "80565"
}
],
"trust": 3.15
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-38391",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-38391"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2009-0945",
"trust": 4.1
},
{
"db": "BID",
"id": "34924",
"trust": 2.8
},
{
"db": "ZDI",
"id": "ZDI-09-022",
"trust": 2.7
},
{
"db": "VUPEN",
"id": "ADV-2009-1297",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2009-1298",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "35074",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "35056",
"trust": 2.5
},
{
"db": "USCERT",
"id": "TA09-133A",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1022207",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2009-1321",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-1621",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "35576",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "35805",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "35095",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "36062",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "36461",
"trust": 1.7
},
{
"db": "XF",
"id": "50477",
"trust": 1.4
},
{
"db": "VUPEN",
"id": "ADV-2011-0212",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "37746",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "36790",
"trust": 1.1
},
{
"db": "SECUNIA",
"id": "43068",
"trust": 1.1
},
{
"db": "USCERT",
"id": "SA09-133A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336",
"trust": 0.8
},
{
"db": "ZDI_CAN",
"id": "ZDI-CAN-464",
"trust": 0.7
},
{
"db": "UBUNTU",
"id": "USN-823-1",
"trust": 0.6
},
{
"db": "UBUNTU",
"id": "USN-822-1",
"trust": 0.6
},
{
"db": "REDHAT",
"id": "RHSA-2009:1130",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2009-8039",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2009-8049",
"trust": 0.6
},
{
"db": "FEDORA",
"id": "FEDORA-2009-6166",
"trust": 0.6
},
{
"db": "CERT/CC",
"id": "TA09-133A",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20090519 ZDI-09-022: APPLE SAFARI MALFORMED SVGLIST PARSING CODE EXECUTION VULNERABILITY",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2009-05-12",
"trust": 0.6
},
{
"db": "APPLE",
"id": "APPLE-SA-2009-06-17-1",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "81589",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "80565",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "80577",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "83759",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "82662",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "85920",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "77670",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-38391",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "83707",
"trust": 0.1
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "BID",
"id": "34924"
},
{
"db": "PACKETSTORM",
"id": "80577"
},
{
"db": "PACKETSTORM",
"id": "83707"
},
{
"db": "PACKETSTORM",
"id": "81589"
},
{
"db": "PACKETSTORM",
"id": "82662"
},
{
"db": "PACKETSTORM",
"id": "83759"
},
{
"db": "PACKETSTORM",
"id": "80565"
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"id": "VAR-200905-0505",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-38391"
}
],
"trust": 0.01
},
"last_update_date": "2025-12-22T20:36:07.047000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "HT3549",
"trust": 1.5,
"url": "http://support.apple.com/kb/HT3549"
},
{
"title": "HT3550",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3550"
},
{
"title": "HT3551",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3551"
},
{
"title": "HT3639",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3639"
},
{
"title": "HT3550",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3550?viewlocale=ja_JP"
},
{
"title": "HT3639",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3639?viewlocale=ja_JP"
},
{
"title": "HT3549",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3549?viewlocale=ja_JP"
},
{
"title": "RHSA-2009:1130",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2009-1130.html"
},
{
"title": "RHSA-2009:1130",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1130J.html"
},
{
"title": "TA09-133A",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/vulnerabilities/ta09-133a.html"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-94",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/34924"
},
{
"trust": 2.5,
"url": "http://www.us-cert.gov/cas/techalerts/ta09-133a.html"
},
{
"trust": 2.5,
"url": "http://www.securitytracker.com/id?1022207"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/35056"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/35074"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"trust": 2.4,
"url": "http://support.apple.com/kb/ht3549"
},
{
"trust": 2.0,
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
},
{
"trust": 2.0,
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2009/may/msg00000.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2009/may/msg00001.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2009/may/msg00002.html"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00005.html"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht3550"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht3639"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-july/msg00303.html"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-july/msg01177.html"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-july/msg01196.html"
},
{
"trust": 1.7,
"url": "http://www.zerodayinitiative.com/advisories/zdi-09-022"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2009-1130.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/35095"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/35576"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/35805"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/36062"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/36461"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-822-1"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/50477"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"trust": 1.1,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a11584"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/36790"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/37746"
},
{
"trust": 1.1,
"url": "http://secunia.com/advisories/43068"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"trust": 1.1,
"url": "https://usn.ubuntu.com/823-1/"
},
{
"trust": 1.1,
"url": "http://www.ubuntu.com/usn/usn-836-1"
},
{
"trust": 1.1,
"url": "http://www.ubuntu.com/usn/usn-857-1"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"trust": 0.9,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0945"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnta09-133a/"
},
{
"trust": 0.8,
"url": "http://jvn.jp/tr/jvntr-2009-12"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-0945"
},
{
"trust": 0.8,
"url": "http://www.us-cert.gov/cas/alerts/sa09-133a.html"
},
{
"trust": 0.6,
"url": "http://websvn.kde.org/?view=rev\u0026revision=983302"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0945"
},
{
"trust": 0.6,
"url": "http://www.ubuntulinux.org/support/documentation/usn/usn-823-1"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/503594/100/0/threaded"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1687"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1698"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1690"
},
{
"trust": 0.3,
"url": "http://www.zerodayinitiative.com/advisories/zdi-09-022/"
},
{
"trust": 0.3,
"url": "http://www.google.com/chrome"
},
{
"trust": 0.3,
"url": "http://www.apple.com/safari/"
},
{
"trust": 0.3,
"url": "/archive/1/503594"
},
{
"trust": 0.3,
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0255.html"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1712"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1711"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1725"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1709"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kfax_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics-doc-html_3.5.10-0ubuntu1~hardy1.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics_3.5.10.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kolourpaint_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kiconedit_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/ksvg_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kghostview_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kruler_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kmrml_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kooka_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kview_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kcoloredit_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kviewshell_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kpdf_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan1_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-dev_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdegraphics_3.5.10-0ubuntu1~hardy1.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kdvi_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kamera_3.5.10-0ubuntu1~hardy1.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kdegraphics-dbg_3.5.10-0ubuntu1~hardy1.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdegraphics/kdegraphics-kfile-plugins_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kfaxview_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/k/kdegraphics/kgamma_3.5.10-0ubuntu1~hardy1.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/ksnapshot_3.5.10-0ubuntu1~hardy1.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/libkscan-dev_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdegraphics/kpovmodeler_3.5.10-0ubuntu1~hardy1.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0791"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0147"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0147"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0166"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0791"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0146"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-0146"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-0166"
},
{
"trust": 0.1,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1709"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-2ubuntu0.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-4ubuntu0.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-2ubuntu0.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-dev_1.0.1-4ubuntu0.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-2ubuntu0.2.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4ubuntu0.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1-4ubuntu0.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/libwebkit-1.0-1_1.0.1-2ubuntu0.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/w/webkit/webkit_1.0.1.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-psql_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-odbc_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc-html_4.4.3-0ubuntu1.4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.5.0.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xml_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qmake_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl-dev_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbus_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-scripttools_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl-dev_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qmake_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.4.3-0ubuntu1.4.diff.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qtconfig_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbus_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qmake_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtgui4_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbg_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.4.3-0ubuntu1.4.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-psql_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qtconfig_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtcore4_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-scripttools_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-help_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-test_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-assistant_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xml_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc-html_4.5.0-0ubuntu4.3_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-mysql_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-psql_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-script_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-odbc_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-svg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xml_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-psql_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-scripttools_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qtconfig_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-script_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-assistant_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-script_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-network_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-svg_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc_4.4.3-0ubuntu1.4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-designer_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtgui4_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns-dbg_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtgui4_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-test_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1699"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-help_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbg_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-network_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-assistant_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-help_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbus_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl-dev_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-core_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools-dbg_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-opengl_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.4.3.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbus_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-script_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-help_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-designer_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-designer_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-scripttools_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-assistant_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-network_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtcore4_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-svg_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-designer_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-scripttools_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dev_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtcore4_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-mysql_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-demos_4.4.3-0ubuntu1.4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-dev-tools-dbg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qtconfig_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-designer_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-mysql_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-test_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-webkit-dbg_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xml_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/qt4-qmake_4.5.0-0ubuntu4.3_powerpc.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1713"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-network_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtgui4_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-opengl-dev_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-webkit_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xml_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-sql-sqlite2_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos-dbg_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtcore4_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbg_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-test_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-doc_4.5.0-0ubuntu4.3_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqtcore4_4.4.3-0ubuntu1.4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-designer_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-script_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qtconfig_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-dev-tools-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-gui_4.5.0-0ubuntu4.3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-svg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqtgui4_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dev_4.4.3-0ubuntu1.4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-sqlite_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-qt3support_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.5.0-0ubuntu4.3.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-qmake_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-gui_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-help_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-core_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-qt3support_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-dbus_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-x11_4.5.0-0ubuntu4.3.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-psql_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-sql-odbc_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-network_4.4.3-0ubuntu1.4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/libqt4-designer_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-svg_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-test_4.5.0-0ubuntu4.3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-assistant_4.5.0-0ubuntu4.3_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/q/qt4-x11/qt4-demos-dbg_4.5.0-0ubuntu4.3_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/q/qt4-x11/libqt4-xmlpatterns_4.4.3-0ubuntu1.4_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_hppa.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1697"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://secunia.com/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mipsel.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-dev_1.0.1-4+lenny2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_amd64.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1681"
},
{
"trust": 0.1,
"url": "http://lists.grok.org.uk/full-disclosure-charter.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1692"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1714"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1694"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_sparc.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1710"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1693"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1684"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_ia64.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_armel.deb"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1695"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/webkit_1.0.1-4+lenny2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1-dbg_1.0.1-4+lenny2_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/w/webkit/libwebkit-1.0-1_1.0.1-4+lenny2_ia64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-doc_4.1.4-0ubuntu1~intrepid1.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu6.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.1.4-0ubuntu1~intrepid1.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-doc_3.5.10-0ubuntu1~hardy1.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1-1ubuntu8.1.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.1.4-0ubuntu1~intrepid1.2.dsc"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu1~hardy1.2.dsc"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.1.4-0ubuntu1~intrepid1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10.dfsg.1-1ubuntu8.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/libplasma3_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kde4libs_4.2.2-0ubuntu5.1.dsc"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu1~hardy1.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs5-data_4.2.2-0ubuntu5.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu6.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dbg_4.2.2-0ubuntu5.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5_4.1.4-0ubuntu1~intrepid1.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/kdelibs-bin_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kde4libs/libplasma-dev_4.2.2-0ubuntu5.1_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu1~hardy1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10.dfsg.1.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10.dfsg.1-1ubuntu8.1_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.2.2-0ubuntu5.1_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu6.1_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10.dfsg.1-1ubuntu8.1_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs5-dev_4.1.4-0ubuntu1~intrepid1.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kde4libs/kdelibs-bin_4.1.4-0ubuntu1~intrepid1.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-data_3.5.10-0ubuntu1~hardy1.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs-dbg_3.5.10-0ubuntu6.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs_3.5.10-0ubuntu6.1.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10.dfsg.1-1ubuntu8.1_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4-dev_3.5.10-0ubuntu1~hardy1.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/k/kdelibs/kdelibs4c2a_3.5.10-0ubuntu6.1_amd64.deb"
}
],
"sources": [
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "BID",
"id": "34924"
},
{
"db": "PACKETSTORM",
"id": "80577"
},
{
"db": "PACKETSTORM",
"id": "83707"
},
{
"db": "PACKETSTORM",
"id": "81589"
},
{
"db": "PACKETSTORM",
"id": "82662"
},
{
"db": "PACKETSTORM",
"id": "83759"
},
{
"db": "PACKETSTORM",
"id": "80565"
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"db": "VULHUB",
"id": "VHN-38391"
},
{
"db": "BID",
"id": "34924"
},
{
"db": "PACKETSTORM",
"id": "80577"
},
{
"db": "PACKETSTORM",
"id": "83707"
},
{
"db": "PACKETSTORM",
"id": "81589"
},
{
"db": "PACKETSTORM",
"id": "82662"
},
{
"db": "PACKETSTORM",
"id": "83759"
},
{
"db": "PACKETSTORM",
"id": "80565"
},
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-05-13T00:00:00",
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"date": "2009-05-13T00:00:00",
"db": "VULHUB",
"id": "VHN-38391"
},
{
"date": "2009-05-12T00:00:00",
"db": "BID",
"id": "34924"
},
{
"date": "2009-08-25T02:40:16",
"db": "PACKETSTORM",
"id": "80577"
},
{
"date": "2009-12-11T00:57:14",
"db": "PACKETSTORM",
"id": "83707"
},
{
"date": "2009-09-24T02:26:59",
"db": "PACKETSTORM",
"id": "81589"
},
{
"date": "2009-11-17T01:34:54",
"db": "PACKETSTORM",
"id": "82662"
},
{
"date": "2009-12-13T23:35:12",
"db": "PACKETSTORM",
"id": "83759"
},
{
"date": "2009-08-24T22:52:06",
"db": "PACKETSTORM",
"id": "80565"
},
{
"date": "2009-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"date": "2009-06-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"date": "2009-05-13T17:30:00.187000",
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-05-13T00:00:00",
"db": "ZDI",
"id": "ZDI-09-022"
},
{
"date": "2018-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-38391"
},
{
"date": "2015-04-13T20:15:00",
"db": "BID",
"id": "34924"
},
{
"date": "2009-06-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200905-181"
},
{
"date": "2009-06-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001336"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2009-0945"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WebKit In SVGPathList Vulnerability in arbitrary code execution related to processing of documents with data structures",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001336"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "code injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200905-181"
}
],
"trust": 0.6
}
}
FKIE_CVE-2009-0945
Vulnerability from fkie_nvd - Published: 2009-05-13 17:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://code.google.com/p/chromium/issues/detail?id=9019 | ||
| cve@mitre.org | http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | ||
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00000.html | Patch, Vendor Advisory | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00001.html | Patch, Vendor Advisory | |
| cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Patch, Vendor Advisory | |
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
| cve@mitre.org | http://secunia.com/advisories/35056 | ||
| cve@mitre.org | http://secunia.com/advisories/35074 | ||
| cve@mitre.org | http://secunia.com/advisories/35095 | ||
| cve@mitre.org | http://secunia.com/advisories/35576 | ||
| cve@mitre.org | http://secunia.com/advisories/35805 | ||
| cve@mitre.org | http://secunia.com/advisories/36062 | ||
| cve@mitre.org | http://secunia.com/advisories/36461 | ||
| cve@mitre.org | http://secunia.com/advisories/36790 | ||
| cve@mitre.org | http://secunia.com/advisories/37746 | ||
| cve@mitre.org | http://secunia.com/advisories/43068 | ||
| cve@mitre.org | http://support.apple.com/kb/HT3549 | Patch, Vendor Advisory | |
| cve@mitre.org | http://support.apple.com/kb/HT3550 | ||
| cve@mitre.org | http://support.apple.com/kb/HT3639 | ||
| cve@mitre.org | http://www.debian.org/security/2009/dsa-1950 | ||
| cve@mitre.org | http://www.redhat.com/support/errata/RHSA-2009-1130.html | ||
| cve@mitre.org | http://www.securityfocus.com/archive/1/503594/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/34924 | ||
| cve@mitre.org | http://www.securitytracker.com/id?1022207 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-822-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-836-1 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/USN-857-1 | ||
| cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/1297 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/1298 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/1321 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2009/1621 | ||
| cve@mitre.org | http://www.vupen.com/english/advisories/2011/0212 | ||
| cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-09-022 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/50477 | ||
| cve@mitre.org | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584 | ||
| cve@mitre.org | https://usn.ubuntu.com/823-1/ | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html | ||
| cve@mitre.org | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://code.google.com/p/chromium/issues/detail?id=9019 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00000.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00001.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35056 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35074 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35095 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35576 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35805 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36062 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36461 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/36790 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37746 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43068 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3549 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3550 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3639 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1950 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1130.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/503594/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34924 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022207 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-822-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-836-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-857-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1297 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1298 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1321 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1621 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0212 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-09-022 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/50477 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/823-1/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html |
| Vendor | Product | Version | |
|---|---|---|---|
| apple | mac_os_x | 10.4.11 | |
| apple | mac_os_x | 10.5.0 | |
| apple | mac_os_x | 10.5.1 | |
| apple | mac_os_x | 10.5.2 | |
| apple | mac_os_x | 10.5.3 | |
| apple | mac_os_x | 10.5.4 | |
| apple | mac_os_x | 10.5.5 | |
| apple | mac_os_x | 10.5.6 | |
| apple | mac_os_x_server | 10.4.11 | |
| apple | mac_os_x_server | 10.5.0 | |
| apple | mac_os_x_server | 10.5.1 | |
| apple | mac_os_x_server | 10.5.2 | |
| apple | mac_os_x_server | 10.5.3 | |
| apple | mac_os_x_server | 10.5.4 | |
| apple | mac_os_x_server | 10.5.6 | |
| microsoft | windows_vista | * | |
| microsoft | windows_xp | * | |
| apple | safari | * | |
| apple | safari | 0.8 | |
| apple | safari | 0.9 | |
| apple | safari | 1.0 | |
| apple | safari | 1.0 | |
| apple | safari | 1.0 | |
| apple | safari | 1.0.0 | |
| apple | safari | 1.0.0b1 | |
| apple | safari | 1.0.0b2 | |
| apple | safari | 1.0.1 | |
| apple | safari | 1.0.2 | |
| apple | safari | 1.0.3 | |
| apple | safari | 1.0.3 | |
| apple | safari | 1.0.3 | |
| apple | safari | 1.1 | |
| apple | safari | 1.1.0 | |
| apple | safari | 1.1.1 | |
| apple | safari | 1.2 | |
| apple | safari | 1.2.0 | |
| apple | safari | 1.2.1 | |
| apple | safari | 1.2.2 | |
| apple | safari | 1.2.3 | |
| apple | safari | 1.2.4 | |
| apple | safari | 1.2.5 | |
| apple | safari | 1.3 | |
| apple | safari | 1.3.0 | |
| apple | safari | 1.3.1 | |
| apple | safari | 1.3.2 | |
| apple | safari | 1.3.2 | |
| apple | safari | 1.3.2 | |
| apple | safari | 2 | |
| apple | safari | 2.0 | |
| apple | safari | 2.0.0 | |
| apple | safari | 2.0.1 | |
| apple | safari | 2.0.2 | |
| apple | safari | 2.0.3 | |
| apple | safari | 2.0.3 | |
| apple | safari | 2.0.3 | |
| apple | safari | 2.0.3 | |
| apple | safari | 2.0.4 | |
| apple | safari | 3 | |
| apple | safari | 3.0 | |
| apple | safari | 3.0.0 | |
| apple | safari | 3.0.1 | |
| apple | safari | 3.0.2 | |
| apple | safari | 3.0.3 | |
| apple | safari | 3.0.4 | |
| apple | safari | 3.1 | |
| apple | safari | 3.1.0 | |
| apple | safari | 3.1.1 | |
| apple | safari | 3.1.2 | |
| apple | safari | 3.2 | |
| apple | safari | 3.2.0 | |
| apple | safari | 3.2.1 | |
| apple | safari | 4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6EE39585-CF3B-4493-96D8-B394544C7643",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DC90AA12-DD17-4607-90CB-E342E83F20BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3F3E721C-00CA-4D51-B542-F2BC5C0D65BF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B3267A41-1AE0-48B8-BD1F-DEC8A212851A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "855288F1-0242-4951-AB3F-B7AF13E21CF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "10082781-B93E-4B84-94F2-FA9749B4D92B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1EBF04-C440-4A6B-93F2-DC3A812728C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB077A2-927B-43AF-BFD5-0E78648C9394",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "D09D5933-A7D9-4A61-B863-CD8E7D5E67D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C7817232-BE3E-4655-8282-A979E5D40D3D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "77E8D614-E1EE-42F1-9E55-EA54FB500621",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C73BED9E-29FB-4965-B38F-013FFE5A9170",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D3B7DEC3-1C0B-4D13-98CD-CB7FAE7933B0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7723A9E8-1DE2-4C7D-81E6-4F79DCB09324",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC681A4-6F58-4C7D-B4E0-FCC1BCBC534E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3852BB02-47A1-40B3-8E32-8D8891A53114",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E61F1C9B-44AF-4B35-A7B2-948EEF7639BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6E139B2-65BD-4416-9D99-48E132BEC3A5",
"versionEndIncluding": "3.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "09F4ADD0-449B-4DDD-9878-DE86CBD56756",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0AECB7-FE62-4664-B3B8-8161DA6DA4BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A419AE8-F5A2-4E25-9004-AAAB325E201A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "64FE1AA1-32D1-4825-8B2B-E66093937D9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E760CD65-A10E-44F1-B835-DA6B77057C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30663B7F-3EDA-4B6B-9F39-65E2CEEB4543",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"matchCriteriaId": "91A09DA0-83E9-491D-A0A5-AF97B5463D62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"matchCriteriaId": "D91C7EF0-A56B-40E6-9CED-1228405D034E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE6078B0-4756-4E04-BAC4-C4EC90548A9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B5A3F2-70EE-4ECD-AD6A-0A72D9EBC755",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C87EDB53-FB6E-4B10-B890-A7195D841C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"matchCriteriaId": "957FCFC4-565A-4F2F-8D3D-D0982E1723F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"matchCriteriaId": "22A450DC-CDF5-4EA0-A703-AFB3DEFE1395",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "857C92E2-6870-409A-9457-75F8C5C7B959",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD75A4F-F529-4F5E-957D-380215F7B21B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "834EC299-2010-4306-8CEE-35D735583101",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "443FF271-A3AB-4659-80B2-89F771BF5371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0D29B98E-2F62-4F6F-976D-FEC4EB07F106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3112AFEB-7893-467C-8B45-A44D5697BB79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC83309-3A97-4619-B5C1-574610838BC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "891514D5-50C8-4EDC-81C5-24ABF8BCC022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "25032A3A-9D05-4E69-9A22-C9B332976769",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "AF75A31C-FE42-4CB4-A0E6-0CAB7B122483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4EDD80AB-2A6C-47FF-A1E9-DEB273C6B4E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EAC0DC3-7B55-49BC-89BC-C588E6FC6828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D9315ADD-5B97-4639-9B59-806EFD7BC247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E7DD81AB-27D6-4CB0-BBF0-5710DAD55A3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"matchCriteriaId": "21BAC0B8-063C-4772-8F1B-EB9A2F7A585C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"matchCriteriaId": "6BAB4071-A883-4E04-BDDF-A121C4738E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E44913D-BC8B-4AA1-84EB-EFEAC531B475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D3889ED-9329-4C84-A173-2553BEAE3EDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B74019F-C365-4E13-BBB4-D84AD9C1F87C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E0E57D5-A7C9-4985-8CE4-E0D4B8BBF371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "06494FA8-F12A-435A-97A4-F38C58DF43F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D1BB047B-D45E-4695-AAEB-D0830DB1663E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"matchCriteriaId": "018A7A39-2AFD-47A9-AE88-7ABDBFE5EDA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"matchCriteriaId": "1082B33F-33B5-453A-A5AA-10F65AB2E625",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"matchCriteriaId": "6CF4DB54-AA7E-44C3-83E3-1A8971719D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DFDCF83E-620C-40FA-9901-5D939E315143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"matchCriteriaId": "E3BAE980-449F-4F8C-A5BC-6CB7226E971A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A33F900-D405-40A8-A0A5-3C80320FF6E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4444A309-5A97-4E1C-B4EA-C4A070A98CBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8CEB23DE-1A9D-480E-8B8B-9F110A8ABDE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "84E78F43-07BD-4D62-9512-DA738A92BC7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F3180366-2240-467E-8AB9-BEA0430948F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB9CC52-E533-4306-9E92-73C84B264D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "912A26D1-3264-464F-B101-1796B35437E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "01D8C2EF-D552-4279-A12E-70E292F39E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C453B588-15FD-4A9C-8BC1-6202A21DAE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "460A6F14-7CCE-47CA-BE0C-6DF32CD6A8A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4DD634B1-4986-4E80-8BDC-58941893F6BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15BB6761-3581-4AE6-85E0-1609D15D7618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA1A4C8-9F87-449F-A11F-52E5D52247E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "9DC87F61-3463-468A-BF0B-070816BBC3CA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption."
},
{
"lang": "es",
"value": "WebKit, utilizado en Safari anterior a v3.2.3 y v4 Public Beta, en Apple Mac OS X v10.4.11 y v10.5 y anteriores a v10.5.7 y Windows permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto elaborado SVGList que provoca una corrupci\u00f3n de memoria."
}
],
"id": "CVE-2009-0945",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-05-13T17:30:00.187",
"references": [
{
"source": "cve@mitre.org",
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
},
{
"source": "cve@mitre.org",
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35056"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35074"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35095"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35576"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/35805"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36062"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36461"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/36790"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/37746"
},
{
"source": "cve@mitre.org",
"url": "http://secunia.com/advisories/43068"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3550"
},
{
"source": "cve@mitre.org",
"url": "http://support.apple.com/kb/HT3639"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"source": "cve@mitre.org",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/34924"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1022207"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"source": "cve@mitre.org",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"source": "cve@mitre.org",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/823-1/"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"source": "cve@mitre.org",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35056"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35074"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35095"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35576"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/35805"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36062"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36461"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/36790"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/37746"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/43068"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.apple.com/kb/HT3639"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/34924"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1022207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/823-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTA-2009-AVI-186
Vulnerability from certfr_avis - Published: 2009-05-13 - Updated: 2009-05-13
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. L'exploitation de certaines d'entre elles peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. Elles touchent divers composants et services installés comme CFNetworks (manipulation des échanges HTTP), CoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation de l'URI help:), QuickDraw Manager (manipulation d'images PICT), Safari (manipulation de l'URI feed:), OpenSSL, PHP, WebKit, X11, etc.
L'exploitation de certaines de ces vulnérabilités peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Solution
Se référer au bulletin de sécurité 2009-002 de Apple pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | Mac OS X Server version 10.4.11 ainsi que celles antérieures. | ||
| Apple | N/A | Mac OS X Server version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.5.6 ainsi que celles antérieures ; | ||
| Apple | N/A | Mac OS X version 10.4.11 ainsi que celles antérieures ; |
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X Server version 10.4.11 ainsi que celles ant\u00e9rieures.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.5.6 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X version 10.4.11 ainsi que celles ant\u00e9rieures ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. Elles touchent divers composants et\nservices install\u00e9s comme CFNetworks (manipulation des \u00e9changes HTTP),\nCoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation\nde l\u0027URI help:), QuickDraw Manager (manipulation d\u0027images PICT), Safari\n(manipulation de l\u0027URI feed:), OpenSSL, PHP, WebKit, X11, etc.\n\nL\u0027exploitation de certaines de ces vuln\u00e9rabilit\u00e9s peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 2009-002 de Apple pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0160"
},
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2009-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0846"
},
{
"name": "CVE-2008-5557",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5557"
},
{
"name": "CVE-2009-0847",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0847"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3657"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2008-1517",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1517"
},
{
"name": "CVE-2008-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3660"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-0456",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0456"
},
{
"name": "CVE-2009-0943",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0943"
},
{
"name": "CVE-2009-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0157"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0010"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2008-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1382"
},
{
"name": "CVE-2004-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1185"
},
{
"name": "CVE-2009-0148",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0148"
},
{
"name": "CVE-2008-2371",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2371"
},
{
"name": "CVE-2008-3658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3658"
},
{
"name": "CVE-2008-3443",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3443"
},
{
"name": "CVE-2008-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3659"
},
{
"name": "CVE-2009-0025",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0025"
},
{
"name": "CVE-2008-3863",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3863"
},
{
"name": "CVE-2008-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2383"
},
{
"name": "CVE-2008-3530",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3530"
},
{
"name": "CVE-2009-0149",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0149"
},
{
"name": "CVE-2009-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0154"
},
{
"name": "CVE-2008-3790",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3790"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2008-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2829"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2009-0144",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0144"
},
{
"name": "CVE-2009-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0162"
},
{
"name": "CVE-2008-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3655"
},
{
"name": "CVE-2004-1186",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1186"
},
{
"name": "CVE-2008-2665",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2665"
},
{
"name": "CVE-2009-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0114"
},
{
"name": "CVE-2008-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2666"
},
{
"name": "CVE-2009-0021",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0021"
},
{
"name": "CVE-2009-0519",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0519"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2008-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3656"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-0844",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0844"
},
{
"name": "CVE-2009-0942",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0942"
},
{
"name": "CVE-2009-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0152"
},
{
"name": "CVE-2009-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0156"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0150"
},
{
"name": "CVE-2008-4309",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4309"
},
{
"name": "CVE-2007-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2754"
},
{
"name": "CVE-2009-0845",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0845"
},
{
"name": "CVE-2009-0944",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0944"
},
{
"name": "CVE-2009-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0164"
},
{
"name": "CVE-2009-0520",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0520"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2009-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0161"
},
{
"name": "CVE-2008-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0158"
},
{
"name": "CVE-2004-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2004-1184"
},
{
"name": "CVE-2008-5077",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5077"
},
{
"name": "CVE-2006-0747",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-0747"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"initial_release_date": "2009-05-13T00:00:00",
"last_revision_date": "2009-05-13T00:00:00",
"links": [
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3397"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple 61798 du 12 mai 2009 :",
"url": "http://docs.info.apple.com/article.html?artnum=61798"
},
{
"title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:",
"url": "http://support.apple.com/kb/HT3549"
}
],
"reference": "CERTA-2009-AVI-186",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de certaines d\u0027entre elles\npeut conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me\nvuln\u00e9rable.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 2009-002 Apple du 12 mai 2009",
"url": null
}
]
}
CERTA-2009-AVI-187
Vulnerability from certfr_avis - Published: 2009-05-13 - Updated: 2009-05-13
De multiples vulnérabilités permettant l'exécution de code arbitraire à distance ont été corrigées dans Apple Safari.
Description
Plusieurs vulnérabilités ont été corrigées dans Apple Safari :
- une vulnérabilité de type débordement de mémoire dans libxml permet l'exécution de code arbitraire à distance (CVE-2008-3529) ;
- des vulnérabilités liées à une mauvaise validation de certaines entrées dans le traitement d'URLs de type feed: permettent l'exécution de code arbitraire à distance (CVE-2009-0162) ;
- une vulnérabilité de type corruption de mémoire dans le traitement d'objets SVGList par WebKit permet l'exécution de code arbitraire à distance (CVE-2009-0945).
Solution
Se référer au bulletin de sécurité HT3550 de l'éditeur pour l'obtention des correctifs (cf. section Documentation). Les mises à jour sont également disponibles dans le correctif cumulatif 2009-002 pour Mac OS X (bulletin HT3549) qui a fait l'objet de l'avis CERTA-2009-AVI-186.
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple Safari 3.x pour Mac OS X 10.4 et Mac OS X 10.5.",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple Safari 3.x pour Windows ;",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans Apple Safari :\n\n- une vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire dans libxml permet\n l\u0027ex\u00e9cution de code arbitraire \u00e0 distance (CVE-2008-3529) ;\n- des vuln\u00e9rabilit\u00e9s li\u00e9es \u00e0 une mauvaise validation de certaines\n entr\u00e9es dans le traitement d\u0027URLs de type feed: permettent\n l\u0027ex\u00e9cution de code arbitraire \u00e0 distance (CVE-2009-0162) ;\n- une vuln\u00e9rabilit\u00e9 de type corruption de m\u00e9moire dans le traitement\n d\u0027objets SVGList par WebKit permet l\u0027ex\u00e9cution de code arbitraire \u00e0\n distance (CVE-2009-0945).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 HT3550 de l\u0027\u00e9diteur pour l\u0027obtention\ndes correctifs (cf. section Documentation). Les mises \u00e0 jour sont\n\u00e9galement disponibles dans le correctif cumulatif 2009-002 pour Mac OS X\n(bulletin HT3549) qui a fait l\u0027objet de l\u0027avis CERTA-2009-AVI-186.\n",
"cves": [
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-0162",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0162"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"initial_release_date": "2009-05-13T00:00:00",
"last_revision_date": "2009-05-13T00:00:00",
"links": [
{
"title": "Avis CERTA-2009-AVI-186 du 13 mai 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-186/index.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3549 du 12 mai 2009 :",
"url": "http://docs.info.apple.com/article.html?artnum=HT3549"
}
],
"reference": "CERTA-2009-AVI-187",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s permettant l\u0027ex\u00e9cution de code arbitraire \u00e0\ndistance ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan class=\"textit\"\u003eApple\nSafari\u003c/span\u003e.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3550 du 12 mai 2009",
"url": "http://docs.info.apple.com/article.html?artnum=HT3550"
}
]
}
CERTA-2009-AVI-243
Vulnerability from certfr_avis - Published: 2009-06-19 - Updated: 2009-06-19
De multiples vulérabilités permettant de réaliser un grand nombre d'actions malveillantes ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch.
Description
De multiples vulnérabilités ont été découvertes dans le système d'exploitation des iPhones et des iPods Touch. L'exploitation de ces vulnérabilités permet à une personne malveillante de réaliser un grand nombre d'actions, dont l'execution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Apple iPod Touch Os versions ant\u00e9rieures \u00e0 la version 3.0.",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Apple iPhone Os versions ant\u00e9rieures \u00e0 la version 3.0 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch. L\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s permet \u00e0 une personne malveillante de r\u00e9aliser un grand\nnombre d\u0027actions, dont l\u0027execution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-0147",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0147"
},
{
"name": "CVE-2009-1702",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1702"
},
{
"name": "CVE-2008-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3652"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2009-1697",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1697"
},
{
"name": "CVE-2009-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0155"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-1694",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1694"
},
{
"name": "CVE-2009-0153",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0153"
},
{
"name": "CVE-2009-1686",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1686"
},
{
"name": "CVE-2009-1688",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1688"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2009-1685",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1685"
},
{
"name": "CVE-2008-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3651"
},
{
"name": "CVE-2009-0040",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0040"
},
{
"name": "CVE-2009-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1683"
},
{
"name": "CVE-2009-1698",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1698"
},
{
"name": "CVE-2009-1701",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1701"
},
{
"name": "CVE-2009-1693",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1693"
},
{
"name": "CVE-2009-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1684"
},
{
"name": "CVE-2008-2320",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2320"
},
{
"name": "CVE-2009-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0165"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2009-1695",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1695"
},
{
"name": "CVE-2008-3623",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3623"
},
{
"name": "CVE-2008-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4409"
},
{
"name": "CVE-2009-1679",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1679"
},
{
"name": "CVE-2009-1692",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1692"
},
{
"name": "CVE-2009-1691",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1691"
},
{
"name": "CVE-2009-0145",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0145"
},
{
"name": "CVE-2009-0146",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0146"
},
{
"name": "CVE-2009-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1179"
},
{
"name": "CVE-2009-1689",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1689"
},
{
"name": "CVE-2009-1687",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1687"
},
{
"name": "CVE-2009-1699",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1699"
},
{
"name": "CVE-2009-0946",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0946"
},
{
"name": "CVE-2009-1680",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1680"
},
{
"name": "CVE-2009-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0958"
},
{
"name": "CVE-2009-0959",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0959"
},
{
"name": "CVE-2009-1700",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1700"
},
{
"name": "CVE-2009-1690",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1690"
},
{
"name": "CVE-2009-0961",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0961"
},
{
"name": "CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
}
],
"initial_release_date": "2009-06-19T00:00:00",
"last_revision_date": "2009-06-19T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-243",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vul\u00e9rabilit\u00e9s permettant de r\u00e9aliser un grand nombre\nd\u0027actions malveillantes ont \u00e9t\u00e9 d\u00e9couvertes dans le syst\u00e8me\nd\u0027exploitation des iPhones et des iPods Touch.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s de l\u0027OS iPhone et iPod Touch d\u0027Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3639 du 17 juin 2009",
"url": "http://support.apple.com/kb/HT3639"
}
]
}
RHSA-2009:1130
Vulnerability from csaf_redhat - Published: 2009-06-25 16:19 - Updated: 2025-11-21 17:34Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kdegraphics packages that fix two security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The kdegraphics packages contain applications for the K Desktop Environment\n(KDE). Scalable Vector Graphics (SVG) is an XML-based language to describe\nvector images. KSVG is a framework aimed at implementing the latest W3C SVG\nspecifications.\n\nA use-after-free flaw was found in the KDE KSVG animation element\nimplementation. A remote attacker could create a specially-crafted SVG\nimage, which once opened by an unsuspecting user, could cause a denial of\nservice (Konqueror crash) or, potentially, execute arbitrary code with the\nprivileges of the user running Konqueror. (CVE-2009-1709)\n\nA NULL pointer dereference flaw was found in the KDE, KSVG SVGList\ninterface implementation. A remote attacker could create a\nspecially-crafted SVG image, which once opened by an unsuspecting user,\nwould cause memory corruption, leading to a denial of service (Konqueror\ncrash). (CVE-2009-0945)\n\nAll users of kdegraphics should upgrade to these updated packages, which\ncontain backported patches to correct these issues. The desktop must be\nrestarted (log out, then log back in) for this update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1130",
"url": "https://access.redhat.com/errata/RHSA-2009:1130"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "506246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506246"
},
{
"category": "external",
"summary": "506703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506703"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1130.json"
}
],
"title": "Red Hat Security Advisory: kdegraphics security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:48+00:00",
"generator": {
"date": "2025-11-21T17:34:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1130",
"initial_release_date": "2009-06-25T16:19:00+00:00",
"revision_history": [
{
"date": "2009-06-25T16:19:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-06-25T12:19:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_productivity:5"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"product": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"product_id": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-13.el5_3?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"product": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"product_id": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-13.el5_3?arch=x86_64\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"product": {
"name": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"product_id": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-13.el5_3?arch=x86_64\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"product": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"product_id": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-debuginfo@3.5.4-13.el5_3?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"product": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"product_id": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics-devel@3.5.4-13.el5_3?arch=i386\u0026epoch=7"
}
}
},
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-13.el5_3.i386",
"product": {
"name": "kdegraphics-7:3.5.4-13.el5_3.i386",
"product_id": "kdegraphics-7:3.5.4-13.el5_3.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-13.el5_3?arch=i386\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kdegraphics-7:3.5.4-13.el5_3.src",
"product": {
"name": "kdegraphics-7:3.5.4-13.el5_3.src",
"product_id": "kdegraphics-7:3.5.4-13.el5_3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kdegraphics@3.5.4-13.el5_3?arch=src\u0026epoch=7"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-13.el5_3.src"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.src as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.src",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.i386 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"relates_to_product_reference": "5Server-DPAS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64 as a component of Red Hat Enterprise Linux Optional Productivity Applications (v. 5 server)",
"product_id": "5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
},
"product_reference": "kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"relates_to_product_reference": "5Server-DPAS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0945",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2009-05-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "506703"
}
],
"notes": [
{
"category": "description",
"text": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kdegraphics: KSVG NULL-pointer dereference in the SVGList interface implementation (ACE)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0945"
},
{
"category": "external",
"summary": "RHBZ#506703",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506703"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0945",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0945"
}
],
"release_date": "2009-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-06-25T16:19:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1130"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "kdegraphics: KSVG NULL-pointer dereference in the SVGList interface implementation (ACE)"
},
{
"cve": "CVE-2009-1709",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2009-06-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "506246"
}
],
"notes": [
{
"category": "description",
"text": "Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari before 4.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, related to SVG set objects, SVG marker elements, the targetElement attribute, and unspecified \"caches.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kdegraphics: KSVG Pointer use-after-free error in the SVG animation element (DoS, ACE)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1709"
},
{
"category": "external",
"summary": "RHBZ#506246",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506246"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1709",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1709"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1709",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1709"
}
],
"release_date": "2009-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-06-25T16:19:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1130"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client-Workstation:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client-Workstation:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-7:3.5.4-13.el5_3.src",
"5Client:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Client:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.src",
"5Server-DPAS:kdegraphics-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-debuginfo-7:3.5.4-13.el5_3.x86_64",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.i386",
"5Server-DPAS:kdegraphics-devel-7:3.5.4-13.el5_3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Critical"
}
],
"title": "kdegraphics: KSVG Pointer use-after-free error in the SVG animation element (DoS, ACE)"
}
]
}
GSD-2009-0945
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-0945",
"description": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.",
"id": "GSD-2009-0945",
"references": [
"https://www.suse.com/security/cve/CVE-2009-0945.html",
"https://www.debian.org/security/2010/dsa-1988",
"https://www.debian.org/security/2009/dsa-1950",
"https://www.debian.org/security/2009/dsa-1866",
"https://access.redhat.com/errata/RHSA-2009:1130"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-0945"
],
"details": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.",
"id": "GSD-2009-0945",
"modified": "2023-12-13T01:19:44.547900Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0945",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "USN-822-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"name": "35805",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35805"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "43068",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43068"
},
{
"name": "FEDORA-2009-8039",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"name": "ADV-2009-1621",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "1022207",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022207"
},
{
"name": "20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
},
{
"name": "RHSA-2009:1130",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"name": "ADV-2009-1298",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"name": "35576",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35576"
},
{
"name": "35074",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35074"
},
{
"name": "37746",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37746"
},
{
"name": "36790",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36790"
},
{
"name": "APPLE-SA-2009-06-17-1",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "35056",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35056"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-022",
"refsource": "MISC",
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"name": "34924",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/34924"
},
{
"name": "36461",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36461"
},
{
"name": "safari-webkit-svglist-bo(50477)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"name": "USN-823-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/823-1/"
},
{
"name": "DSA-1950",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "36062",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36062"
},
{
"name": "USN-857-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "oval:org.mitre.oval:def:11584",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "35095",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35095"
},
{
"name": "FEDORA-2009-8049",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"name": "http://support.apple.com/kb/HT3550",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT3550"
},
{
"name": "FEDORA-2009-6166",
"refsource": "FEDORA",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"name": "USN-836-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"name": "ADV-2009-1321",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=9019",
"refsource": "CONFIRM",
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8.1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9.2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.3:85.8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.3:417.9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.3.2:312.6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:4.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0.0b2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.0:beta:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:1.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.2.2",
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-0945"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00001.html"
},
{
"name": "http://support.apple.com/kb/HT3549",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://support.apple.com/kb/HT3549"
},
{
"name": "APPLE-SA-2009-05-12",
"refsource": "APPLE",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://lists.apple.com/archives/security-announce/2009/May/msg00000.html"
},
{
"name": "http://support.apple.com/kb/HT3550",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3550"
},
{
"name": "1022207",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022207"
},
{
"name": "35056",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35056"
},
{
"name": "ADV-2009-1298",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1298"
},
{
"name": "ADV-2009-1297",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1297"
},
{
"name": "TA09-133A",
"refsource": "CERT",
"tags": [
"US Government Resource"
],
"url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html"
},
{
"name": "35074",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35074"
},
{
"name": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html",
"refsource": "CONFIRM",
"tags": [],
"url": "http://googlechromereleases.blogspot.com/2009/05/stable-update-bug-fix.html"
},
{
"name": "ADV-2009-1321",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1321"
},
{
"name": "http://code.google.com/p/chromium/issues/detail?id=9019",
"refsource": "CONFIRM",
"tags": [],
"url": "http://code.google.com/p/chromium/issues/detail?id=9019"
},
{
"name": "35095",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35095"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-09-022",
"refsource": "MISC",
"tags": [],
"url": "http://www.zerodayinitiative.com/advisories/ZDI-09-022"
},
{
"name": "ADV-2009-1621",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2009/1621"
},
{
"name": "http://support.apple.com/kb/HT3639",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.apple.com/kb/HT3639"
},
{
"name": "APPLE-SA-2009-06-17-1",
"refsource": "APPLE",
"tags": [],
"url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html"
},
{
"name": "34924",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/34924"
},
{
"name": "RHSA-2009:1130",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1130.html"
},
{
"name": "35576",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35576"
},
{
"name": "FEDORA-2009-6166",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00303.html"
},
{
"name": "35805",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/35805"
},
{
"name": "FEDORA-2009-8049",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01196.html"
},
{
"name": "FEDORA-2009-8039",
"refsource": "FEDORA",
"tags": [],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01177.html"
},
{
"name": "36062",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36062"
},
{
"name": "36461",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36461"
},
{
"name": "USN-822-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-822-1"
},
{
"name": "37746",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/37746"
},
{
"name": "DSA-1950",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2009/dsa-1950"
},
{
"name": "USN-857-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-857-1"
},
{
"name": "USN-836-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/USN-836-1"
},
{
"name": "36790",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/36790"
},
{
"name": "SUSE-SR:2011:002",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html"
},
{
"name": "43068",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/43068"
},
{
"name": "ADV-2011-0212",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2011/0212"
},
{
"name": "safari-webkit-svglist-bo(50477)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50477"
},
{
"name": "oval:org.mitre.oval:def:11584",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11584"
},
{
"name": "USN-823-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/823-1/"
},
{
"name": "20090519 ZDI-09-022: Apple Safari Malformed SVGList Parsing Code Execution Vulnerability",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/503594/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": true
}
},
"lastModifiedDate": "2018-10-10T19:32Z",
"publishedDate": "2009-05-13T17:30Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.