SUSE SLED15 / SLES15 / openSUSE 15 Security Update : qt6-base (SUSE-SU-2023:3225-1)

medium Nessus Plugin ID 179593

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2023:3225-1 advisory.

- Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3. (CVE-2023-24607)

- An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match. (CVE-2023-32762)

- An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1.
QDnsLookup has a buffer over-read via a crafted reply from a DNS server. (CVE-2023-33285)

- An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2.
Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate. (CVE-2023-34410)

- An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3.
There are infinite loops in recursive entity expansion. (CVE-2023-38197)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1209616

https://bugzilla.suse.com/1211642

https://bugzilla.suse.com/1211797

https://bugzilla.suse.com/1211994

https://bugzilla.suse.com/1213326

http://www.nessus.org/u?2fee0e5b

https://www.suse.com/security/cve/CVE-2023-24607

https://www.suse.com/security/cve/CVE-2023-32762

https://www.suse.com/security/cve/CVE-2023-33285

https://www.suse.com/security/cve/CVE-2023-34410

https://www.suse.com/security/cve/CVE-2023-38197

Plugin Details

Severity: Medium

ID: 179593

File Name: suse_SU-2023-3225-1.nasl

Version: 1.0

Type: local

Agent: unix

Published: 8/9/2023

Updated: 8/9/2023

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2023-34410

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:qt6-opengl-private-devel, p-cpe:/a:novell:suse_linux:libqt6opengl6, p-cpe:/a:novell:suse_linux:qt6-test-devel, p-cpe:/a:novell:suse_linux:libqt6test6, p-cpe:/a:novell:suse_linux:qt6-gui-private-devel, p-cpe:/a:novell:suse_linux:qt6-core-devel, p-cpe:/a:novell:suse_linux:qt6-network-devel, p-cpe:/a:novell:suse_linux:libqt6dbus6, p-cpe:/a:novell:suse_linux:qt6-printsupport-devel, p-cpe:/a:novell:suse_linux:qt6-network-tls, p-cpe:/a:novell:suse_linux:qt6-widgets-private-devel, p-cpe:/a:novell:suse_linux:libqt6sql6, p-cpe:/a:novell:suse_linux:qt6-core-private-devel, p-cpe:/a:novell:suse_linux:libqt6core6, p-cpe:/a:novell:suse_linux:qt6-sql-sqlite, p-cpe:/a:novell:suse_linux:libqt6widgets6, p-cpe:/a:novell:suse_linux:qt6-opengl-devel, p-cpe:/a:novell:suse_linux:qt6-kmssupport-private-devel, p-cpe:/a:novell:suse_linux:qt6-sql-devel, p-cpe:/a:novell:suse_linux:libqt6gui6, p-cpe:/a:novell:suse_linux:qt6-gui-devel, p-cpe:/a:novell:suse_linux:libqt6printsupport6, p-cpe:/a:novell:suse_linux:qt6-openglwidgets-devel, p-cpe:/a:novell:suse_linux:qt6-xml-devel, p-cpe:/a:novell:suse_linux:qt6-dbus-devel, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:qt6-base-devel, p-cpe:/a:novell:suse_linux:libqt6xml6, p-cpe:/a:novell:suse_linux:qt6-widgets-devel, p-cpe:/a:novell:suse_linux:libqt6openglwidgets6, p-cpe:/a:novell:suse_linux:qt6-kmssupport-devel-static, p-cpe:/a:novell:suse_linux:qt6-platformsupport-devel-static, p-cpe:/a:novell:suse_linux:qt6-base-common-devel, p-cpe:/a:novell:suse_linux:libqt6concurrent6, p-cpe:/a:novell:suse_linux:libqt6network6, p-cpe:/a:novell:suse_linux:qt6-concurrent-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/8/2023

Vulnerability Publication Date: 4/15/2023

Reference Information

CVE: CVE-2023-24607, CVE-2023-32762, CVE-2023-33285, CVE-2023-34410, CVE-2023-38197

SuSE: SUSE-SU-2023:3225-1