{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Medium"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"qt security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for qt is now available for openEuler-22.03-LTS-SP2.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Qt (pronounced as \"cute\", not \"cu-tee\") is a cross-platform framework that is usually used as a graphical toolkit, although it is also very helpful in creating CLI applications. It runs on the three major desktop OSes, as well as on mobile OSes, such as Symbian, Nokia Belle, Meego Harmattan, MeeGo or BB10, and on embedded devices. Ports for Android (Necessitas) and iOS are also in development\n\nSecurity Fix(es):\n\nAn issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.(CVE-2023-34410)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for qt is now available for openEuler-22.03-LTS-SP2.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Medium",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"qt",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2023-1810",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1810"
			},
			{
				"summary":"CVE-2023-34410",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-34410&packageName=qt"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34410"
			},
			{
				"summary":"openEuler-SA-2023-1810 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2023/csaf-openeuler-sa-2023-1810.json"
			}
		],
		"title":"An update for qt is now available for openEuler-22.03-LTS-SP2",
		"tracking":{
			"initial_release_date":"2023-11-10T14:26:22+08:00",
			"revision_history":[
				{
					"date":"2023-11-10T14:26:22+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T14:26:22+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T14:26:22+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T14:26:22+08:00",
			"id":"openEuler-SA-2023-1810",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"openEuler-22.03-LTS-SP2",
									"name":"openEuler-22.03-LTS-SP2"
								},
								"name":"openEuler-22.03-LTS-SP2",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-debugsource-4.8.7-55.oe2203sp2.aarch64.rpm",
									"name":"qt-debugsource-4.8.7-55.oe2203sp2.aarch64.rpm"
								},
								"name":"qt-debugsource-4.8.7-55.oe2203sp2.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-debuginfo-4.8.7-55.oe2203sp2.aarch64.rpm",
									"name":"qt-debuginfo-4.8.7-55.oe2203sp2.aarch64.rpm"
								},
								"name":"qt-debuginfo-4.8.7-55.oe2203sp2.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-devel-4.8.7-55.oe2203sp2.aarch64.rpm",
									"name":"qt-devel-4.8.7-55.oe2203sp2.aarch64.rpm"
								},
								"name":"qt-devel-4.8.7-55.oe2203sp2.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-4.8.7-55.oe2203sp2.aarch64.rpm",
									"name":"qt-4.8.7-55.oe2203sp2.aarch64.rpm"
								},
								"name":"qt-4.8.7-55.oe2203sp2.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-4.8.7-55.oe2203sp2.src.rpm",
									"name":"qt-4.8.7-55.oe2203sp2.src.rpm"
								},
								"name":"qt-4.8.7-55.oe2203sp2.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-debugsource-4.8.7-55.oe2203sp2.x86_64.rpm",
									"name":"qt-debugsource-4.8.7-55.oe2203sp2.x86_64.rpm"
								},
								"name":"qt-debugsource-4.8.7-55.oe2203sp2.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-debuginfo-4.8.7-55.oe2203sp2.x86_64.rpm",
									"name":"qt-debuginfo-4.8.7-55.oe2203sp2.x86_64.rpm"
								},
								"name":"qt-debuginfo-4.8.7-55.oe2203sp2.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-4.8.7-55.oe2203sp2.x86_64.rpm",
									"name":"qt-4.8.7-55.oe2203sp2.x86_64.rpm"
								},
								"name":"qt-4.8.7-55.oe2203sp2.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP2"
									},
									"product_id":"qt-devel-4.8.7-55.oe2203sp2.x86_64.rpm",
									"name":"qt-devel-4.8.7-55.oe2203sp2.x86_64.rpm"
								},
								"name":"qt-devel-4.8.7-55.oe2203sp2.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-debugsource-4.8.7-55.oe2203sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.aarch64",
					"name":"qt-debugsource-4.8.7-55.oe2203sp2.aarch64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-debuginfo-4.8.7-55.oe2203sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.aarch64",
					"name":"qt-debuginfo-4.8.7-55.oe2203sp2.aarch64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-devel-4.8.7-55.oe2203sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.aarch64",
					"name":"qt-devel-4.8.7-55.oe2203sp2.aarch64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-4.8.7-55.oe2203sp2.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.aarch64",
					"name":"qt-4.8.7-55.oe2203sp2.aarch64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-4.8.7-55.oe2203sp2.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.src",
					"name":"qt-4.8.7-55.oe2203sp2.src as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-debugsource-4.8.7-55.oe2203sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.x86_64",
					"name":"qt-debugsource-4.8.7-55.oe2203sp2.x86_64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-debuginfo-4.8.7-55.oe2203sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.x86_64",
					"name":"qt-debuginfo-4.8.7-55.oe2203sp2.x86_64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-4.8.7-55.oe2203sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.x86_64",
					"name":"qt-4.8.7-55.oe2203sp2.x86_64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP2",
				"product_reference":"qt-devel-4.8.7-55.oe2203sp2.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.x86_64",
					"name":"qt-devel-4.8.7-55.oe2203sp2.x86_64 as a component of openEuler-22.03-LTS-SP2"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-34410",
			"notes":[
				{
					"text":"An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.aarch64",
					"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.aarch64",
					"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.aarch64",
					"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.aarch64",
					"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.src",
					"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.x86_64",
					"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.x86_64",
					"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.x86_64",
					"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.src",
						"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.x86_64"
					],
					"details":"qt security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1810"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.aarch64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.src",
						"openEuler-22.03-LTS-SP2:qt-debugsource-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-debuginfo-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-4.8.7-55.oe2203sp2.x86_64",
						"openEuler-22.03-LTS-SP2:qt-devel-4.8.7-55.oe2203sp2.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-34410"
		}
	]
}