Il 27/07/22 16:53, Thiago Macieira ha scritto:
On Wednesday, 27 July 2022 05:20:59 PDT Giuseppe D'Angelo via Development
wrote:
Does this mean that the currently available opensource binary downloads
(through the official installer) of Qt 5.15(.2) and 6.2 are affected by
the CVE and will not get fixed?

Should they just be removed from the online installers?
Follow the same rule as 6.1. If 6.1 is there, then so should 6.2 be. If that
one is not there, then remove 6.2 too.

There is sense in having access to historical, out-of-support and potentially
security-vulnerable software, so long as it's clear that is the case.

Right now, if one selects "LTS" and "Latest releases" (and *not* "Archive"), one gets

* 6.3.1
* 6.2.4
* 5.15.2

all of which are bugged AFAICT?

Thanks,

--
Giuseppe D'Angelo | giuseppe.dang...@kdab.com | Senior Software Engineer
KDAB (France) S.A.S., a KDAB Group company
Tel. France +33 (0)4 90 84 08 53, http://www.kdab.com
KDAB - The Qt, C++ and OpenGL Experts

Attachment: smime.p7s
Description: Firma crittografica S/MIME

_______________________________________________
Development mailing list
Development@qt-project.org
https://lists.qt-project.org/listinfo/development
  • ... List for announcements regarding Qt releases and development via Development
    • ... Giuseppe D'Angelo via Development
      • ... Andy Shaw
      • ... Thiago Macieira
        • ... Giuseppe D'Angelo via Development
          • ... Thiago Macieira
            • ... Scott Bloom
              • ... Thiago Macieira
                • ... Scott Bloom
                • ... Kevin Kofler via Development
            • ... Giuseppe D'Angelo via Development
              • ... Volker Hilsheimer
                • ... Albert Astals Cid
                • ... Kevin Kofler via Development
                • ... Volker Hilsheimer

Reply via email to