First published: Fri Jan 04 2013(Updated: )
A security flaw was found in the way QSslSocket implementation of the Qt, a software toolkit for applications development, performed certificate verification callbacks, when Qt libraries were used with different OpenSSL version than the one, they were compiled against. In such scenario, this would result in a connection error, but with the SSL error list to contain QSslError:NoError instead of proper reason of the error. This might result in a confusing error being presented to the end users, possibly encouraging them to ignore the SSL errors for the site the connection was initiated against. References: [1] <a href="http://lists.qt-project.org/pipermail/announce/2013-January/000020.html">http://lists.qt-project.org/pipermail/announce/2013-January/000020.html</a> Relevant upstream patch: [2] <a href="https://codereview.qt-project.org/#change,42461">https://codereview.qt-project.org/#change,42461</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | ||
OpenSSL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-891955 is considered high due to the potential for certificate verification issues leading to security risks.
To fix REDHAT-BUG-891955, ensure that the Qt libraries are compiled with the same OpenSSL version being used at runtime.
REDHAT-BUG-891955 affects systems utilizing Qt in conjunction with incompatible versions of OpenSSL.
Risks associated with REDHAT-BUG-891955 include potential man-in-the-middle attacks due to improper certificate validation.
Yes, patches have been released to address REDHAT-BUG-891955 and should be applied as soon as possible.