Unrated severityNVD Advisory· Published May 22, 2023· Updated Jan 21, 2025
CVE-2023-33285
CVE-2023-33285
Description
An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.
Affected products
44- Qt/Qtdescription
- osv-coords43 versionspkg:rpm/almalinux/qt5pkg:rpm/almalinux/qt5-develpkg:rpm/almalinux/qt5-qtbasepkg:rpm/almalinux/qt5-qtbase-commonpkg:rpm/almalinux/qt5-qtbase-develpkg:rpm/almalinux/qt5-qtbase-examplespkg:rpm/almalinux/qt5-qtbase-guipkg:rpm/almalinux/qt5-qtbase-mysqlpkg:rpm/almalinux/qt5-qtbase-odbcpkg:rpm/almalinux/qt5-qtbase-postgresqlpkg:rpm/almalinux/qt5-qtbase-private-develpkg:rpm/almalinux/qt5-qtbase-staticpkg:rpm/almalinux/qt5-rpm-macrospkg:rpm/almalinux/qt5-srpm-macrospkg:rpm/opensuse/libqt5-qtbase&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/libqt5-qtbase&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/libqt5-qtbase&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qt6-base&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/qt6-base&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/qt6-base&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/qt6-base-docs&distro=openSUSE%20Leap%2015.4pkg:rpm/opensuse/qt6-base-docs&distro=openSUSE%20Leap%2015.5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Enterprise%20Storage%207pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-ESPOSpkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP4pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP4pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Manager%20Proxy%204.2pkg:rpm/suse/libqt5-qtbase&distro=SUSE%20Manager%20Server%204.2pkg:rpm/suse/qt6-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP5pkg:rpm/suse/qt6-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP4pkg:rpm/suse/qt6-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5
< 5.15.9-1.el9+ 42 more
- (no CPE)range: < 5.15.9-1.el9
- (no CPE)range: < 5.15.9-1.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-7.el9
- (no CPE)range: < 5.15.9-1.el9
- (no CPE)range: < 5.15.9-1.el9
- (no CPE)range: < 5.15.2+kde294-150400.6.6.1
- (no CPE)range: < 5.15.8+kde185-150500.4.8.1
- (no CPE)range: < 5.15.10+kde129-1.1
- (no CPE)range: < 6.2.2-150400.4.6.1
- (no CPE)range: < 6.4.2-150500.3.7.4
- (no CPE)range: < 6.6.0-3.1
- (no CPE)range: < 6.2.2-150400.4.6.1
- (no CPE)range: < 6.4.2-150500.3.7.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.15.2+kde294-150400.6.6.1
- (no CPE)range: < 5.15.8+kde185-150500.4.8.1
- (no CPE)range: < 5.15.2+kde294-150400.6.6.1
- (no CPE)range: < 5.15.8+kde185-150500.4.8.1
- (no CPE)range: < 5.6.2-6.36.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.6.2-6.36.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.6.2-6.36.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 5.12.7-150200.4.23.1
- (no CPE)range: < 6.4.2-150500.3.7.4
- (no CPE)range: < 6.2.2-150400.4.6.1
- (no CPE)range: < 6.4.2-150500.3.7.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.