Bugzilla – Bug 1211642
VUL-0: CVE-2023-33285: libqt5-qtbase,qt6-base: Buffer overflow in QDnsLookup
Last modified: 2023-12-05 13:50:55 UTC
CVE-2023-33285 An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-33285 https://www.cve.org/CVERecord?id=CVE-2023-33285 http://www.cvedetails.com/cve/CVE-2023-33285/ https://codereview.qt-project.org/c/qt/qtbase/+/477644
Affected: - SUSE:SLE-12-SP1:Update/libqt5-qtbase 5.5.1 - SUSE:SLE-12-SP2:Update/libqt5-qtbase 5.6.1 - SUSE:SLE-12-SP3:Update/libqt5-qtbase 5.6.2 - SUSE:SLE-15:Update/libqt5-qtbase 5.9.4 - SUSE:SLE-15-SP1:Update/libqt5-qtbase 5.9.7 - SUSE:SLE-15-SP2:Update/libqt5-qtbase 5.12.7 - SUSE:SLE-15-SP4:Update/libqt5-qtbase 5.15.2 - SUSE:SLE-15-SP5:Update/libqt5-qtbase 5.15.8 - openSUSE:Factory/libqt5-qtbase 5.15.9 - SUSE:SLE-15-SP4:Update/qt6-base 6.2.2 - SUSE:SLE-15-SP5:Update/qt6-base 6.4.2 - openSUSE:Factory/qt6-base 6.5.0 Not Affected: - SUSE:SLE-11:Update/qt3 3.3.8b - SUSE:SLE-11-SP3:Update/libqt4 4.6.3 - SUSE:SLE-12:Update/libqt4 4.8.7
sr#1089079 for qt6-base to :Factory sr#1088808 for libqt5-qtbase to :Factory
I already sr#1088684 for 2 other CVE not tracked in bugzilla (CVE-2023-32762 and CVE-2023-32762). Depending on how much time the SLE reviewers take, I'll eventually submit fixes to SP4 and SP5.
(In reply to Christophe Marin from comment #3) > I already sr#1088684 already submitted*
Qt posted their security announce with link to patches: Qt 6.5: https://codereview.qt-project.org/c/qt/qtbase/+/477704 or https://download.qt.io/official_releases/qt/6.5/CVE-2023-33285-qtbase-6.5.diff Qt 6.2: https://download.qt.io/official_releases/qt/6.2/CVE-2023-33285-qtbase-6.2.diff Qt 5.15: https://download.qt.io/official_releases/qt/5.15/CVE-2023-33285-qtbase-5.15.diff Considering my previous submit request for SLE didn't get attention, I won't submit them.
SUSE-SU-2023:2982-1: An update that solves six vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1209616, 1211024, 1211642, 1211797, 1211798, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-32762, CVE-2023-32763, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: Desktop Applications Module 15-SP4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 openSUSE Leap 15.4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 Basesystem Module 15-SP4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2971-1: An update that solves four vulnerabilities can now be installed. Category: security (important) Bug References: 1209616, 1211642, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libqt5-qtbase-5.6.2-6.36.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libqt5-qtbase-5.6.2-6.36.1 SUSE Linux Enterprise Server 12 SP5 (src): libqt5-qtbase-5.6.2-6.36.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libqt5-qtbase-5.6.2-6.36.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3018-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1209616, 1211642, 1211797, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-32762, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: Basesystem Module 15-SP5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.8.1 Desktop Applications Module 15-SP5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.8.1 openSUSE Leap 15.5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3207-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1209616, 1211642, 1211797, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-32762, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Manager Proxy 4.2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Manager Retail Branch Server 4.2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Manager Server 4.2 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Enterprise Storage 7.1 (src): libqt5-qtbase-5.12.7-150200.4.23.1 SUSE Enterprise Storage 7 (src): libqt5-qtbase-5.12.7-150200.4.23.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3225-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1209616, 1211642, 1211797, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-32762, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: openSUSE Leap 15.5 (src): qt6-base-docs-6.4.2-150500.3.7.1, qt6-base-6.4.2-150500.3.7.4 Desktop Applications Module 15-SP5 (src): qt6-base-6.4.2-150500.3.7.4 SUSE Package Hub 15 15-SP5 (src): qt6-base-6.4.2-150500.3.7.4 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
@Christophe, thank you for your submission, i had a look and i think sr#1088684 is not the correct way to submit to sle. i am not sure if that is even possible to do that from external. @Antonio these are still affected, could you please have a look? - SUSE:SLE-15-SP4:Update/qt6-base 6.2.2 --> Christophe tried to submit this, could you have a look at sr#1088684 please? Otherwise all good, thank you a lot for your submissions!
I just submitted https://build.suse.de/request/show/305726 with a few other fixes that I prepared some weeks ago.
SUSE-SU-2023:3380-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1211642, 1211797, 1211798, 1211994, 1213326 CVE References: CVE-2023-32762, CVE-2023-32763, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: SUSE Package Hub 15 15-SP4 (src): qt6-base-6.2.2-150400.4.6.1 openSUSE Leap 15.4 (src): qt6-base-docs-6.2.2-150400.4.6.1, qt6-base-6.2.2-150400.4.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.