<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for kdebase4-runtime, kdelibs4, konversation, kwebkitpart, libqt4</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0573-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-03-12T18:33:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-03-12T18:33:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-03-12T18:33:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for kdebase4-runtime, kdelibs4, konversation, kwebkitpart, libqt4</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">KDE and QT were updated to fix security issues and bugs.

The following vulerabilities were fixed:

* CVE-2014-0190: Malformed GIF files could have crashed QT based applications
* CVE-2015-0295: Malformed BMP files could have crashed QT based applications
* CVE-2014-8600: Multiple cross-site scripting (XSS) vulnerabilities in the KDE runtime could have allowed remote attackers to insert arbitrary web script or HTML via crafted URIs using one of several supported URL schemes
* CVE-2014-8483: A missing size check in the Blowfish ECB could have lead to a crash of Konversation or 11 byte information leak
* CVE-2014-3494: The KMail POP3 kioslave accepted invalid certifiates and allowed a man-in-the-middle (MITM) attack

Additionally, Konversation was updated to 1.5.1 to fix bugs.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0573-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="kdebase4-runtime-4.11.5-482.6">
      <FullProductName ProductID="kdebase4-runtime-4.11.5-482.6">kdebase4-runtime-4.11.5-482.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdebase4-runtime-branding-upstream-4.11.5-482.6">
      <FullProductName ProductID="kdebase4-runtime-branding-upstream-4.11.5-482.6">kdebase4-runtime-branding-upstream-4.11.5-482.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdebase4-runtime-devel-4.11.5-482.6">
      <FullProductName ProductID="kdebase4-runtime-devel-4.11.5-482.6">kdebase4-runtime-devel-4.11.5-482.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdelibs4-4.11.5-488.2">
      <FullProductName ProductID="kdelibs4-4.11.5-488.2">kdelibs4-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdelibs4-apidocs-4.11.5-488.3">
      <FullProductName ProductID="kdelibs4-apidocs-4.11.5-488.3">kdelibs4-apidocs-4.11.5-488.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdelibs4-branding-upstream-4.11.5-488.2">
      <FullProductName ProductID="kdelibs4-branding-upstream-4.11.5-488.2">kdelibs4-branding-upstream-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdelibs4-core-4.11.5-488.2">
      <FullProductName ProductID="kdelibs4-core-4.11.5-488.2">kdelibs4-core-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kdelibs4-doc-4.11.5-488.2">
      <FullProductName ProductID="kdelibs4-doc-4.11.5-488.2">kdelibs4-doc-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="konversation-1.5.1-3.4.3">
      <FullProductName ProductID="konversation-1.5.1-3.4.3">konversation-1.5.1-3.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="konversation-lang-1.5.1-3.4.3">
      <FullProductName ProductID="konversation-lang-1.5.1-3.4.3">konversation-lang-1.5.1-3.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kwebkitpart-1.3.3-2.4.1">
      <FullProductName ProductID="kwebkitpart-1.3.3-2.4.1">kwebkitpart-1.3.3-2.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="kwebkitpart-lang-1.3.3-2.4.1">
      <FullProductName ProductID="kwebkitpart-lang-1.3.3-2.4.1">kwebkitpart-lang-1.3.3-2.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkde4-4.11.5-488.2">
      <FullProductName ProductID="libkde4-4.11.5-488.2">libkde4-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkde4-32bit-4.11.5-488.2">
      <FullProductName ProductID="libkde4-32bit-4.11.5-488.2">libkde4-32bit-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkde4-devel-4.11.5-488.2">
      <FullProductName ProductID="libkde4-devel-4.11.5-488.2">libkde4-devel-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkdecore4-4.11.5-488.2">
      <FullProductName ProductID="libkdecore4-4.11.5-488.2">libkdecore4-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkdecore4-32bit-4.11.5-488.2">
      <FullProductName ProductID="libkdecore4-32bit-4.11.5-488.2">libkdecore4-32bit-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libkdecore4-devel-4.11.5-488.2">
      <FullProductName ProductID="libkdecore4-devel-4.11.5-488.2">libkdecore4-devel-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libksuseinstall-devel-4.11.5-488.2">
      <FullProductName ProductID="libksuseinstall-devel-4.11.5-488.2">libksuseinstall-devel-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libksuseinstall1-4.11.5-488.2">
      <FullProductName ProductID="libksuseinstall1-4.11.5-488.2">libksuseinstall1-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libksuseinstall1-32bit-4.11.5-488.2">
      <FullProductName ProductID="libksuseinstall1-32bit-4.11.5-488.2">libksuseinstall1-32bit-4.11.5-488.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-4.8.5-5.17.1">libqt4-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-32bit-4.8.5-5.17.1">libqt4-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-devel-4.8.5-5.17.1">libqt4-devel-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-doc-4.8.5-5.17.2">
      <FullProductName ProductID="libqt4-devel-doc-4.8.5-5.17.2">libqt4-devel-doc-4.8.5-5.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-devel-doc-data-4.8.5-5.17.2">
      <FullProductName ProductID="libqt4-devel-doc-data-4.8.5-5.17.2">libqt4-devel-doc-data-4.8.5-5.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-linguist-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-linguist-4.8.5-5.17.1">libqt4-linguist-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-private-headers-devel-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-private-headers-devel-4.8.5-5.17.1">libqt4-private-headers-devel-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-qt3support-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-qt3support-4.8.5-5.17.1">libqt4-qt3support-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-qt3support-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-qt3support-32bit-4.8.5-5.17.1">libqt4-qt3support-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-4.8.5-5.17.1">libqt4-sql-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-32bit-4.8.5-5.17.1">libqt4-sql-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-mysql-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-mysql-4.8.5-5.17.1">libqt4-sql-mysql-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-mysql-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-mysql-32bit-4.8.5-5.17.1">libqt4-sql-mysql-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-plugins-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-plugins-4.8.5-5.17.1">libqt4-sql-plugins-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-postgresql-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-postgresql-4.8.5-5.17.1">libqt4-sql-postgresql-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-postgresql-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-postgresql-32bit-4.8.5-5.17.1">libqt4-sql-postgresql-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-sqlite-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-sqlite-4.8.5-5.17.1">libqt4-sql-sqlite-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-sqlite-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-sqlite-32bit-4.8.5-5.17.1">libqt4-sql-sqlite-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-unixODBC-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-unixODBC-4.8.5-5.17.1">libqt4-sql-unixODBC-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-sql-unixODBC-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-sql-unixODBC-32bit-4.8.5-5.17.1">libqt4-sql-unixODBC-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-x11-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-x11-4.8.5-5.17.1">libqt4-x11-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libqt4-x11-32bit-4.8.5-5.17.1">
      <FullProductName ProductID="libqt4-x11-32bit-4.8.5-5.17.1">libqt4-x11-32bit-4.8.5-5.17.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="plasma-theme-oxygen-4.11.5-482.6">
      <FullProductName ProductID="plasma-theme-oxygen-4.11.5-482.6">plasma-theme-oxygen-4.11.5-482.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="qt4-x11-tools-4.8.5-5.17.2">
      <FullProductName ProductID="qt4-x11-tools-4.8.5-5.17.2">qt4-x11-tools-4.8.5-5.17.2</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.</Note>
    </Notes>
    <CVE>CVE-2014-0190</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0190.html</URL>
        <Description>CVE-2014-0190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/875470</URL>
        <Description>SUSE Bug 875470</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kio/usernotificationhandler.cpp in the POP3 kioslave in kdelibs 4.10.95 before 4.13.3 does not properly generate warning notifications, which allows man-in-the-middle attackers to obtain sensitive information via an invalid certificate.</Note>
    </Notes>
    <CVE>CVE-2014-3494</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3494.html</URL>
        <Description>CVE-2014-3494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/883374</URL>
        <Description>SUSE Bug 883374</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.</Note>
    </Notes>
    <CVE>CVE-2014-8483</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8483.html</URL>
        <Description>CVE-2014-8483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/902670</URL>
        <Description>SUSE Bug 902670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple cross-site scripting (XSS) vulnerabilities in KDE-Runtime 4.14.3 and earlier, kwebkitpart 1.3.4 and earlier, and kio-extras 5.1.1 and earlier allow remote attackers to inject arbitrary web script or HTML via a crafted URI using the (1) zip, (2) trash, (3) tar, (4) thumbnail, (5) smtps, (6) smtp, (7) smb, (8) remote, (9) recentdocuments, (10) nntps, (11) nntp, (12) network, (13) mbox, (14) ldaps, (15) ldap, (16) fonts, (17) file, (18) desktop, (19) cgi, (20) bookmarks, or (21) ar scheme, which is not properly handled in an error message.</Note>
    </Notes>
    <CVE>CVE-2014-8600</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8600.html</URL>
        <Description>CVE-2014-8600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905742</URL>
        <Description>SUSE Bug 905742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.</Note>
    </Notes>
    <CVE>CVE-2015-0295</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-03/msg00068.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0295.html</URL>
        <Description>CVE-2015-0295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/921999</URL>
        <Description>SUSE Bug 921999</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927806</URL>
        <Description>SUSE Bug 927806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927807</URL>
        <Description>SUSE Bug 927807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927808</URL>
        <Description>SUSE Bug 927808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/936523</URL>
        <Description>SUSE Bug 936523</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
