Bugzilla – Bug 1196654
VUL-0: CVE-2021-45930: libqt5-qtsvg: out-of-bounds write may lead to DoS
Last modified: 2024-07-26 10:08:50 UTC
An out-of-bounds write in QtPrivate::QCommonArrayOps<QPainterPath::Element>::growAppend (called from QPainterPath::addPath and QPathClipper::intersect). External Reference: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37025 References: https://bugzilla.redhat.com/show_bug.cgi?id=2037339 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37025 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-45930 https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=37306 https://github.com/qt/qtsvg/commit/a3b753c2d077313fc9eb93af547051b956e383fc https://github.com/qt/qtsvg/commit/79bb9f51fa374106a612d17c9d98d35d807be670 https://github.com/qt/qtsvg/commit/36cfd9efb9b22b891adee9c48d30202289cfa620 http://www.cvedetails.com/cve/CVE-2021-45930/ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45930 https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qt/OSV-2021-1121.yaml https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V75XNX4GDB64N5BSOAN474RUXXS5OHRU/ https://lists.debian.org/debian-lts-announce/2022/01/msg00020.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GZIXNSX7FV733TWTTLY6FHSH3SCNQKKD/ https://lists.debian.org/debian-lts-announce/2022/01/msg00022.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GKOKVCSDZSOWWR3HOW5XUIUJC4MKQY5/
Affected packages: - SUSE:SLE-12-SP2:Update/libqt5-qtsvg 5.6.1 - SUSE:SLE-12-SP3:Update/libqt5-qtsvg 5.6.2 - SUSE:SLE-15:Update/libqt5-qtsvg 5.9.4 - SUSE:SLE-15-SP1:Update/libqt5-qtsvg 5.9.7 - SUSE:SLE-15-SP2:Update/libqt5-qtsvg 5.12.7 Upstream patch: https://github.com/qt/qtsvg/commit/a3b753c2d077313fc9eb93af547051b956e383fc
SUSE-SU-2023:2969-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1196654, 1211298 CVE References: CVE-2021-45930, CVE-2023-32573 Sources used: openSUSE Leap 15.5 (src): libqt5-qtsvg-5.15.8+kde8-150500.3.3.1 Basesystem Module 15-SP5 (src): libqt5-qtsvg-5.15.8+kde8-150500.3.3.1 Desktop Applications Module 15-SP5 (src): libqt5-qtsvg-5.15.8+kde8-150500.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2981-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1196654, 1211298 CVE References: CVE-2021-45930, CVE-2023-32573 Sources used: openSUSE Leap 15.4 (src): libqt5-qtsvg-5.15.2+kde16-150400.3.3.1 Basesystem Module 15-SP4 (src): libqt5-qtsvg-5.15.2+kde16-150400.3.3.1 Desktop Applications Module 15-SP4 (src): libqt5-qtsvg-5.15.2+kde16-150400.3.3.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:3209-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1196654, 1211298 CVE References: CVE-2021-45930, CVE-2023-32573 Sources used: SUSE Linux Enterprise Real Time 15 SP3 (src): libqt5-qtsvg-5.12.7-150200.3.8.1 SUSE Manager Proxy 4.2 (src): libqt5-qtsvg-5.12.7-150200.3.8.1 SUSE Manager Retail Branch Server 4.2 (src): libqt5-qtsvg-5.12.7-150200.3.8.1 SUSE Manager Server 4.2 (src): libqt5-qtsvg-5.12.7-150200.3.8.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4622-1: An update that solves six vulnerabilities can now be installed. Category: security (important) Bug References: 1196654, 1211298, 1211798, 1211994, 1213326, 1214327 CVE References: CVE-2021-45930, CVE-2023-32573, CVE-2023-32763, CVE-2023-34410, CVE-2023-37369, CVE-2023-38197 Sources used: SUSE Linux Enterprise Workstation Extension 12 12-SP5 (src): libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Server 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libqt4-devel-doc-4.8.7-8.19.1, libqt4-4.8.7-8.19.1, libqt4-sql-plugins-4.8.7-8.19.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:2967-1: An update that solves two vulnerabilities can now be installed. Category: security (moderate) Bug References: 1196654, 1211298 CVE References: CVE-2021-45930, CVE-2023-32573 Sources used: SUSE Linux Enterprise Software Development Kit 12 SP5 (src): libqt5-qtsvg-5.6.2-3.11.1 SUSE Linux Enterprise High Performance Computing 12 SP5 (src): libqt5-qtsvg-5.6.2-3.11.1 SUSE Linux Enterprise Server 12 SP5 (src): libqt5-qtsvg-5.6.2-3.11.1 SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): libqt5-qtsvg-5.6.2-3.11.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
All done, closing.