Buffer Overflow Affecting qt5-qtbase-examples package, versions <0:5.15.9-7.el9


Severity

Recommended
medium

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.17% (54th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL9-QT5QTBASEEXAMPLES-5844455
  • published17 Aug 2023
  • disclosed13 Jul 2023

Introduced: 13 Jul 2023

CVE-2023-37369  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade RHEL:9 qt5-qtbase-examples to version 0:5.15.9-7.el9 or higher.
This issue was patched in RHSA-2023:6369.

NVD Description

Note: Versions mentioned in the description apply only to the upstream qt5-qtbase-examples package and not the qt5-qtbase-examples package as distributed by RHEL. See How to fix? for RHEL:9 relevant fixed versions and status.

In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.

CVSS Scores

version 3.1