Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 908085 (CVE-2023-33285, CVE-2023-34410) - <dev-qt/qtnetwork-5.15.9-r3, <dev-qt/qtbase-6.5.1: incorrect certificate validation
Summary: <dev-qt/qtnetwork-5.15.9-r3, <dev-qt/qtbase-6.5.1: incorrect certificate vali...
Status: RESOLVED FIXED
Alias: CVE-2023-33285, CVE-2023-34410
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: A4 [noglsa]
Keywords:
Depends on: 907047 qt-5.15.10-stable
Blocks:
  Show dependency tree
 
Reported: 2023-06-09 04:28 UTC by John Helmert III
Modified: 2023-08-16 05:42 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-06-09 04:28:03 UTC
CVE-2023-34410 (https://codereview.qt-project.org/c/qt/qtbase/+/477560):
https://codereview.qt-project.org/c/qt/qtbase/+/480002

An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.

Are we affected?
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-06-09 04:28:42 UTC
CVE-2023-33285 (https://codereview.qt-project.org/c/qt/qtbase/+/477644):

An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.
Comment 2 Larry the Git Cow gentoo-dev 2023-06-10 09:34:25 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=524acfede1f643d6c8d7ff0c96e977cb2cd18378

commit 524acfede1f643d6c8d7ff0c96e977cb2cd18378
Author:     Andreas Sturmlechner <asturm@gentoo.org>
AuthorDate: 2023-06-10 09:31:26 +0000
Commit:     Andreas Sturmlechner <asturm@gentoo.org>
CommitDate: 2023-06-10 09:32:58 +0000

    dev-qt/qtnetwork: Fix CVE-2023-34410
    
    CVE-2023-33285 already fixed in dev-qt/qtnetwork-5.15.9-r2.
    
    Bug: https://bugs.gentoo.org/908085
    Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org>

 .../files/qtnetwork-5.15.9-CVE-2023-34410.patch    | 113 +++++++++++++++++++++
 dev-qt/qtnetwork/qtnetwork-5.15.9-r3.ebuild        |  81 +++++++++++++++
 2 files changed, 194 insertions(+)
Comment 3 Larry the Git Cow gentoo-dev 2023-07-13 08:42:22 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d0556a48018dd0028b52b044b14349ae8b97046f

commit d0556a48018dd0028b52b044b14349ae8b97046f
Author:     Andreas Sturmlechner <asturm@gentoo.org>
AuthorDate: 2023-07-13 07:35:58 +0000
Commit:     Andreas Sturmlechner <asturm@gentoo.org>
CommitDate: 2023-07-13 08:42:04 +0000

    dev-qt/qtnetwork: drop 5.15.9
    
    Bug: https://bugs.gentoo.org/908085
    Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org>

 dev-qt/qtnetwork/Manifest                          |   2 -
 .../files/qtnetwork-5.15.9-CVE-2023-32762.patch    |  39 -------
 .../files/qtnetwork-5.15.9-CVE-2023-34410.patch    | 113 ---------------------
 ....15.9-QDnsLookup-dont-overflow-the-buffer.patch | 103 -------------------
 .../qtnetwork-5.15.9-libproxy-0.5-pkgconfig.patch  |  32 ------
 dev-qt/qtnetwork/qtnetwork-5.15.9-r2.ebuild        |  80 ---------------
 dev-qt/qtnetwork/qtnetwork-5.15.9-r3.ebuild        |  81 ---------------
 dev-qt/qtnetwork/qtnetwork-5.15.9.ebuild           |  74 --------------
 8 files changed, 524 deletions(-)
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-07-23 22:28:34 UTC
What are the accurate fixed versions, then? Was qtbase ever affected in Gentoo?
Comment 5 Chiitoo gentoo-dev 2023-07-24 04:48:50 UTC
For qtbase, CVE-2023-33285 patch for 6.5.0 was added 2023-06-0, and 6.5.1 was added with the CVE-2023-34410 patch on 2023-06-10, with 6.5.0 being removed shortly after.
Comment 6 Andreas Sturmlechner gentoo-dev 2023-07-25 11:13:20 UTC
Fixing summary accordingly then.
Comment 7 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2023-08-16 05:42:10 UTC
Makes sense, thank you! All done then.