September 07, 2011 by Peter Hartmann | Comments
This blog post continues from the previous blog post, What the DigiNotar security breach means for Qt users.
Contrary to an earlier DigiNotar statement, possibly all DigiNotar intermediate certificates are affected by the attack; this means that blacklisting only the DigiNotar root certificate is not enough. Since some of those intermediates are cross-signed, i.e. their trust does not ultimately rely on the DigiNotar root certificate, they need to be blacklisted.
Below are patches provided that blacklist all DigiNotar intermediates and root certificates.
(or if the patch for blacklisting the fraudulent Comodo certificates has been applied to earlier versions (see the blog post on the Comodo attack):
blacklist-diginotar-certs.diff
blacklist-diginotar-and-comodo-certs.diff
All upcoming Qt versions, including 4.8 and 5, will contain a fix for the problem already (see e.g. the Qt 5 commit, the commits in the 4.7 and 4.8 repositories are not public yet).
Thanks to Rich Moore from KDE for cross-reading this post.
Download the latest release here: www.qt.io/download.
Qt 6.10 is now available, with new features and improvements for application developers and device creators.
Check out all our open positions here and follow us on Instagram to see what it's like to be #QtPeople.
Dec 3, 2025
Improper Validation of Specified Quantity in Input vulnerability in Text..
Oct 3, 2025
Two vulnerabilities in Qt SVG module have been discovered. Uncontrolled..
Sep 26, 2025
Have you heard about Jenny? No, I do not mean, the girl next door, nor the..