Source: qt6-base Version: 6.4.2+dfsg-10 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: clone -1 -2 Control: reassign -2 src:qtbase-opensource-src 5.15.8+dfsg-11 Control: retitle -2 qtbase-opensource-src: CVE-2023-34410
Hi, The following vulnerability was published for Qt. CVE-2023-34410[0]: | An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and | 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS | does not always consider whether the root of a chain is a configured | CA certificate. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-34410 https://www.cve.org/CVERecord?id=CVE-2023-34410 Please adjust the affected versions in the BTS as needed. Regards, Salvatore -- System Information: Debian Release: 12.0 APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 6.3.0-0-amd64 (SMP w/8 CPU threads; PREEMPT) Kernel taint flags: TAINT_DIE, TAINT_WARN Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled