Lucene search

K
qtAndy ShawQT:6F05AFD0E6CE93B7ED32DB613621EB6F
HistorySep 22, 2023 - 12:00 a.m.

Two Qt security advisories: GDI Font Engine & WebP image format

2023-09-2200:00:00
Andy Shaw
www.qt.io
12
qt security
gdi font engine
webp image
cve id
patches
workaround
buffer overflow
update
qt 5.15.16
qt 6.2.10
qt 6.5.3
qt 6.6.0

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.642 Medium

EPSS

Percentile

97.9%

An issue on Windows with the GDI font engine has been reported and has been assigned the CVE id CVE-2023-43114.

When corrupt font data is passed to the GDI font engine via QFontDatabase::addApplicationFont[FromData] then it can trigger a crash in the application.

Solution: As a workaround, validate that the font is safe to use beforehand. Or apply the following patch or update to Qt 5.15.16, Qt 6.2.10, Qt 6.5.3, Qt 6.6.0

Patches:

dev: <https://codereview.qt-project.org/c/qt/qtbase/+/503026&gt;
6.5: <https://download.qt.io/official_releases/qt/6.5/CVE-2023-43114-6.5.patch&gt;
6.2: <https://download.qt.io/official_releases/qt/6.2/CVE-2023-43114-6.2.patch&gt;
5.15: <https://download.qt.io/official_releases/qt/5.15/CVE-2023-43114-5.15.patch&gt;

An issue in the libwebp library has been recently reported and assigned the CVE id CVE-2023-4863.

When a malicious WebP image is passed to the library then it can cause a buffer overflow.

Solution: As a workaround, update the WebP library manually to 1.3.2 and rebuild the imageformat plugin. Alternatively, apply the corresponding patch or update to Qt 5.15.16, Qt 6.2.10, Qt 6.5.3, Qt 6.6.0

Patches:

dev: <https://codereview.qt-project.org/c/qt/qtimageformats/+/504175&gt;
6.5: <https://download.qt.io/official_releases/qt/6.5/CVE-2023-4863-6.5.patch&gt;
6.2: <https://download.qt.io/official_releases/qt/6.2/CVE-2023-4863-6.2.patch&gt;
5.15: <https://download.qt.io/official_releases/qt/5.15/CVE-2023-4863-5.15.patch&gt;

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.642 Medium

EPSS

Percentile

97.9%