TencentOS Server 4: qt5-qtbase (TSSA-2024:1096)

high Nessus Plugin ID 238774

Synopsis

The remote TencentOS Server 4 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 4 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2024:1096 advisory.

Package updates are available for TencentOS Server 4 that fix the following vulnerabilities:

CVE-2023-33285:
Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.

CVE-2023-32763:
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2.
Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.

CVE-2023-32573:
An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1.
QDnsLookup has a buffer over-read via a crafted reply from a DNS server.

CVE-2023-24607:
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.

CVE-2023-34410:
An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.

CVE-2023-32762:
In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20241096.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33285

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32763

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32573

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24607

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34410

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32762

Plugin Details

Severity: High

ID: 238774

File Name: tencentos_TSSA_2024_1096.nasl

Version: 1.1

Type: local

Published: 6/16/2025

Updated: 6/16/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:qt5-qtbase, cpe:/o:tencent:tencentos_server:4

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/etc/os-release, Host/TencentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/10/2024

Vulnerability Publication Date: 12/10/2024