Qt is a software toolkit for developing applications.
This package contains base tools, like string, xml, and network
handling.
Security fix for CVE-2023-34410 ---- Security fix for CVE-2023-32573
* Fri Jun 9 2023 Than Ngo - 4.8.7-73
- fix #2212749, CVE-2023-34410
* Thu May 18 2023 Than Ngo - 4.8.7-72
- fix #2208136, CVE-2023-32573 Uninitialized variable usage in m_unitsPerEm
[ 1 ] Bug #2208135 - CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm
https://bugzilla.redhat.com/show_bug.cgi?id=2208135
[ 2 ] Bug #2212747 - CVE-2023-34410 qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
https://bugzilla.redhat.com/show_bug.cgi?id=2212747
su -c 'dnf upgrade --advisory FEDORA-2023-0d4b3316f6' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
FEDORA-2023-0d4b3316f6
2023-06-15 01:26:23.768178
Product : Fedora 38
Version : 4.8.7
Release : 73.fc38
URL : https://qt-project.org/
Summary : Qt toolkit
Description :
Qt is a software toolkit for developing applications.
This package contains base tools, like string, xml, and network
handling.
Security fix for CVE-2023-34410 ---- Security fix for CVE-2023-32573
* Fri Jun 9 2023 Than Ngo - 4.8.7-73
- fix #2212749, CVE-2023-34410
* Thu May 18 2023 Than Ngo - 4.8.7-72
- fix #2208136, CVE-2023-32573 Uninitialized variable usage in m_unitsPerEm
[ 1 ] Bug #2208135 - CVE-2023-32573 qt: Uninitialized variable usage in m_unitsPerEm
https://bugzilla.redhat.com/show_bug.cgi?id=2208135
[ 2 ] Bug #2212747 - CVE-2023-34410 qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation
https://bugzilla.redhat.com/show_bug.cgi?id=2212747
su -c 'dnf upgrade --advisory FEDORA-2023-0d4b3316f6' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue