Mageia alert MGASA-2023-0190 (qtbase5)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2023-0190: Updated qtbase5 packages fix security vulnerability | |
| Date: | Wed, 31 May 2023 08:42:32 +0200 | |
| Message-ID: | <20230531064232.5DDE9A13AF@duvel.mageia.org> | |
| Archive-link: | Article |
MGASA-2023-0190 - Updated qtbase5 packages fix security vulnerability Publication date: 31 May 2023 URL: https://advisories.mageia.org/MGASA-2023-0190.html Type: security Affected Mageia releases: 8 CVE: CVE-2023-32762, CVE-2023-32763 Description: Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match. (CVE-2023-32762) QTextLayout buffer overflow in SVG file rendering. (CVE-2023-32763) References: - https://bugs.mageia.org/show_bug.cgi?id=31940 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3... SRPMS: - 8/core/qtbase5-5.15.2-4.9.mga8
