SB2024081359 - SUSE update for libqt5-qtbase
Published: August 13, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) NULL pointer dereference (CVE-ID: CVE-2023-45935)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the QXcbConnection::initializeAllAtoms(). A local user can crash the application.
2) Integer overflow (CVE-ID: CVE-2023-51714)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer overflow in network/access/http2/hpacktable.cpp within the HTTP2 implementation in Qt. A remote attacker can pass specially crafted data to the application, trigger integer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2024-39936)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a race condition in HTTP2 support when establishing an encrypted connection. A remote attacker can potentially force the application to send data before the encrypted() signal, leading to potential information disclosure.
Remediation
Install update from vendor's website.