Qt may load shared libraries from an untrusted, world-writable directory, resulting in the execution of arbitrary code.
| Package | x11-libs/qt on all architectures | 
|---|---|
| Affected versions | < 3.3.4-r2 | 
| Unaffected versions | >= 3.3.4-r2 | 
Qt is a cross-platform GUI toolkit used by KDE.
Tavis Ormandy of the Gentoo Linux Security Audit Team has discovered that Qt searches for shared libraries in an untrusted, world-writable directory.
A local attacker could create a malicious shared object that would be loaded by Qt, resulting in the execution of arbitrary code with the privileges of the Qt application.
There is no known workaround at this time.
All Qt users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r2"
      Release date
      
      March 01, 2005
    
      Latest revision
      
      May 22, 2006: 02
    
      Severity
      
      normal
    
      Exploitable
      
      local
    
Bugzilla entries