Fedora Linux 8579 Published by

A mingw-qt5-qtbase security update has been released for Fedora 38.



[SECURITY] Fedora 38 Update: mingw-qt5-qtbase-5.15.10-4.fc38


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-0e68827d36
2023-08-30 01:35:03.119188
--------------------------------------------------------------------------------

Name : mingw-qt5-qtbase
Product : Fedora 38
Version : 5.15.10
Release : 4.fc38
URL : http://qt.io/
Summary : Qt5 for Windows - QtBase component
Description :
This package contains the Qt software toolkit for developing
cross-platform applications.

This is the Windows version of Qt, for use in conjunction with the
Fedora Windows cross-compiler.

--------------------------------------------------------------------------------
Update Information:

Backport fix for CVE-2023-37369.
--------------------------------------------------------------------------------
ChangeLog:

* Wed Aug 16 2023 Sandro Mani [manisandro@gmail.com] - 5.15.10-4
- Backport fix for CVE-2023-37369
* Thu Jul 20 2023 Fedora Release Engineering [releng@fedoraproject.org] - 5.15.10-3
- Rebuilt for https://fedoraproject.org/wiki/Fedora_39_Mass_Rebuild
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2232357 - CVE-2023-37369 mingw-qt5-qtbase: qtbase: buffer overflow in QXmlStreamReader [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2232357
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-0e68827d36' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------