{"id":"MGASA-2014-0009","summary":"Updated qt4 package fixes security vulnerability","details":"It was discovered that QXmlSimpleReader in Qt incorrectly handled XML\nentity expansion. An attacker could use this flaw to cause Qt applications\nto consume large amounts of resources, resulting in a denial of service\n(CVE-2013-4549).\n","modified":"2026-04-16T01:45:25.325693486Z","published":"2014-01-17T00:20:35Z","upstream":["CVE-2013-4549"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0009.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=12043"},{"type":"WEB","url":"http://lists.qt-project.org/pipermail/announce/2013-December/000036.html"},{"type":"WEB","url":"http://www.ubuntu.com/usn/usn-2057-1/"}],"affected":[{"package":{"name":"qt4","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/qt4?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.8.5-1.3.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0009.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}