Bugzilla – Bug 1211798
VUL-0: CVE-2023-32763: qt3,libqt5-qtbase,qt6-base,libqt4: When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered
Last modified: 2024-05-14 10:49:54 UTC
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32763 https://www.cve.org/CVERecord?id=CVE-2023-32763 http://www.cvedetails.com/cve/CVE-2023-32763/ https://codereview.qt-project.org/c/qt/qtbase/+/476125 https://lists.qt-project.org/pipermail/announce/2023-May/000413.html
Affected versions: - SUSE:SLE-15-SP5:Update/qt6-base - SUSE:SLE-12-SP2:Update/libqt5-qtbase - SUSE:SLE-15-SP1:Update/libqt5-qtbase - SUSE:SLE-12-SP1:Update/libqt5-qtbase - SUSE:SLE-15:Update/libqt5-qtbase - SUSE:SLE-11:Update/qt3 - SUSE:SLE-12-SP3:Update/libqt5-qtbase - SUSE:SLE-15-SP2:Update/libqt5-qtbase - SUSE:SLE-12:Update/libqt4 - SUSE:SLE-15-SP5:Update/libqt5-qtbase
Solution: Apply the following patch or update to Qt 5.15.15, Qt 6.2.9 or Qt 6.5.1 Patches: dev: https://codereview.qt-project.org/c/qt/qtbase/+/476125 Qt 6.5: https://codereview.qt-project.org/c/qt/qtbase/+/476490 or https://download.qt.io/official_releases/qt/6.5/CVE-2023-32763-qtbase-6.5.diff Qt 6.2: https://download.qt.io/official_releases/qt/6.2/CVE-2023-32763-qtbase-6.2.diff Qt 5.15: https://download.qt.io/official_releases/qt/5.15/CVE-2023-32763-qtbase-5.15.diff
I created the following SRs to fix this: SLE-15-SP5 / libqt5-qtbase : https://build.suse.de/request/show/302405 SLE-15-SP5 / qt6-base : https://build.suse.de/request/show/302404 I'm still working on the fix for SLE-12-SP3, since that seems to require some other fixes.
SUSE-SU-2023:2780-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1211798 CVE References: CVE-2023-32763 Sources used: Desktop Applications Module 15-SP5 (src): qt6-base-6.4.2-150500.3.3.1 SUSE Package Hub 15 15-SP5 (src): qt6-base-6.4.2-150500.3.3.1 openSUSE Leap 15.5 (src): qt6-base-docs-6.4.2-150500.3.3.1, qt6-base-6.4.2-150500.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2816-1: An update that solves two vulnerabilities can now be installed. Category: security (important) Bug References: 1189408, 1211798 CVE References: CVE-2020-24741, CVE-2023-32763 Sources used: SUSE OpenStack Cloud 9 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE OpenStack Cloud Crowbar 9 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Server for SAP Applications 12 SP4 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Server 12 SP5 (src): libqt5-qtbase-5.6.2-6.33.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libqt5-qtbase-5.6.2-6.33.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2860-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1211798 CVE References: CVE-2023-32763 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise Real Time 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Manager Proxy 4.2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Manager Retail Branch Server 4.2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Manager Server 4.2 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Enterprise Storage 7.1 (src): libqt5-qtbase-5.12.7-150200.4.20.1 SUSE Enterprise Storage 7 (src): libqt5-qtbase-5.12.7-150200.4.20.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2982-1: An update that solves six vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1209616, 1211024, 1211642, 1211797, 1211798, 1211994, 1213326 CVE References: CVE-2023-24607, CVE-2023-32762, CVE-2023-32763, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: Desktop Applications Module 15-SP4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 openSUSE Leap 15.4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 Basesystem Module 15-SP4 (src): libqt5-qtbase-5.15.2+kde294-150400.6.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3380-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1211642, 1211797, 1211798, 1211994, 1213326 CVE References: CVE-2023-32762, CVE-2023-32763, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197 Sources used: SUSE Package Hub 15 15-SP4 (src): qt6-base-6.2.2-150400.4.6.1 openSUSE Leap 15.4 (src): qt6-base-docs-6.2.2-150400.4.6.1, qt6-base-6.2.2-150400.4.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4622-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1196654, 1211298, 1211798, 1211994, 1213326, 1214327 CVE References: CVE-2021-45930, CVE-2023-32573, CVE-2023-32763, CVE-2023-34410, CVE-2023-37369, CVE-2023-38197 Sources used: SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Server 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2824-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1211798 CVE References: CVE-2023-32763 Sources used: openSUSE Leap 15.5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.3.1 Basesystem Module 15-SP5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.3.1 Desktop Applications Module 15-SP5 (src): libqt5-qtbase-5.15.8+kde185-150500.4.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
done, closing