- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202402-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: QtNetwork: Multiple Vulnerabilities
Date: February 18, 2024
Bugs: #907120, #921292
ID: 202402-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in QtNetwork, the worst of
which could lead to execution of arbitrary code.
Background
==========
QtNetwork provides a set of APIs for programming applications that use
TCP/IP. It is part of the Qt framework.
Affected packages
=================
Package Vulnerable Unaffected
---------------- ------------ -------------
dev-qt/qtbase < 6.6.1-r2 >= 6.6.1-r2
dev-qt/qtnetwork < 5.15.12-r1 >= 5.15.12-r1
Description
===========
Multiple vulnerabilities have been discovered in QtNetwork. Please
review the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Qt 5 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-qt/qtnetwork-5.15.12-r1"
All Qt 6 users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-qt/qtbase-6.6.1-r2"
References
==========
[ 1 ] CVE-2023-32762
https://nvd.nist.gov/vuln/detail/CVE-2023-32762
[ 2 ] CVE-2023-51714
https://nvd.nist.gov/vuln/detail/CVE-2023-51714
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202402-21
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmXR5TgACgkQFMQkOaVy +9n46g/+Oc1Xhyuw6GZP9741HQPvHTwR9CgAtDQLzqyPDQbV5rNiCsFK3emThxAQ pqiwl94KqPdJmIbuWwgip6qhax29y79bkjaN7TpklvPB34f9u1czOWvbyJU2NSbk fPVvsUkZ3DISNaFCZ5FB6Z7eAoPHrmZKr3+F8il8Wua7sW4DqO5qrgpHut5AGg3F M/AleeqyWFSpSIT5FyEd7zFhHVEXnM2hkvpTh0PmcRTze5v6AHK6OZTcUpzioSw+ E+Fjp4WPEpHd22amm6l0tko7FIiYqIAm+x2zEa4XOD7o3rW3xhbi+aSK6dHwBGRv rWA/WonlgIxehV8ZRS687HnY18GNAY8u89r3Ra7vgAwb0p8qu5cYZGU2SzOqJFUU ExmHL4XlrepnHohuTHLS/ZArSikuVSuQWH2vX/AuCtXEHM4w2t2G/Em4Ihe/vd7V o8u6zncXziDI9g8ODjQyEuIXXq9VWqMuvFVbL0VmCQW4wUHlM6X383j15pAqcek+ HgMzfwAqalV9CKwtHVU1pdYqlJtasO4xauq+PTQjdDBeWip6I8AajJqXD4pd2aeB KKXHn3jQdwTYBR3NXORG3m+Hu2Hrt8zFnXYfD38hYVkKqnpPAL912zr45pDFppmc EVplxUm5gCKzICGSrihO0zY3uHi1iNnW26S23jkEHtygpHtgCIc=
=H9z+
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)