Debian Security Advisory 1426-1 - Several local/remote vulnerabilities have been discovered in the Qt GUI Library.
5c082ffb313e5bed2505f52c4b98056b4600ea82437d9d3a9c050d680cc070dd
Gentoo Linux Security Advisory GLSA 200708-16 - Tim Brown of Portcullis Computer Security Ltd and Dirk Mueller of KDE reported multiple format string errors in qWarning() calls in files qtextedit.cpp, qdatatable.cpp, qsqldatabase.cpp, qsqlindex.cpp, qsqlrecord.cpp, qglobal.cpp, and qsvgdevice.cpp. Versions less than 3.3.8-r3 are affected.
80a0f7dba946f1db00ba3c0d7e46e7509d5e70a1ae25e2200e1a0ad559695e67
Ubuntu Security Notice 495-1 - Several format string vulnerabilities have been discovered in Qt warning messages. By causing an application to process specially crafted input data which triggered Qt warnings, this could be exploited to execute arbitrary code with the privilege of the user running the application.
3af02e0cb10c6ad4a19ff42552fd333e868c606423b7a9da6c9a09f0fa7b804d
Mandriva Linux Security Advisory - A number of format string flaws have been discovered in how Qt handled error messages by Dirk Mueller and Tracey Parry of Portcullis Computer Security. If an application linked against Qt created an error message from user-supplied data in a certain way, it could possibly lead to the execution of arbitrary code or a denial of service.
85b644841b5c6e804f9410d7ae0928ba5edd7a6d6ea5c121b9cee9ee70a9285c