First published: Wed May 10 2023(Updated: )
In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Qt Qt | <5.15.14 | |
Qt Qt | >=6.0.0<6.2.9 | |
Qt Qt | >=6.3.0<6.5.1 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32573 is medium, with a severity value of 6.5.
Qt versions before 5.15.14, 6.0.x through 6.2.9, and 6.3.x through 6.5.1 are affected by CVE-2023-32573.
In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.
Apply the necessary updates or patches provided by Qt or Redhat Enterprise Linux to fix CVE-2023-32573.
Yes, you can find reference material for CVE-2023-32573 at the following links: [Link 1](https://codereview.qt-project.org/c/qt/qtsvg/+/474093), [Link 2](https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html), [Link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/)