First published: Fri Jan 04 2013(Updated: )
A security flaw was found in the way QSslSocket implementation of the Qt, a software toolkit for applications development, performed certificate verification callbacks, when Qt libraries were used with different OpenSSL version than the one, they were compiled against. In such scenario, this would result in a connection error, but with the SSL error list to contain QSslError:NoError instead of proper reason of the error. This might result in a confusing error being presented to the end users, possibly encouraging them to ignore the SSL errors for the site the connection was initiated against. References: [1] <a href="http://lists.qt-project.org/pipermail/announce/2013-January/000020.html">http://lists.qt-project.org/pipermail/announce/2013-January/000020.html</a> Relevant upstream patch: [2] <a href="https://codereview.qt-project.org/#change,42461">https://codereview.qt-project.org/#change,42461</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Qt Qt | <=4.6.5 | |
Qt Qt | =4.6.0 | |
Qt Qt | =4.6.0-rc1 | |
Qt Qt | =4.6.1 | |
Qt Qt | =4.6.2 | |
Qt Qt | =4.6.3 | |
Qt Qt | =4.6.4 | |
Qt Qt | =4.7.0 | |
Qt Qt | =4.7.1 | |
Qt Qt | =4.7.2 | |
Qt Qt | =4.7.3 | |
Qt Qt | =4.7.4 | |
Qt Qt | =4.7.5 | |
Qt Qt | =4.7.6-rc | |
Qt Qt | =4.8.0 | |
Qt Qt | =4.8.1 | |
Qt Qt | =4.8.2 | |
Qt Qt | =4.8.3 | |
Qt Qt | =4.8.4 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.