{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"High"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"qt security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for qt is now available for openEuler-22.03-LTS-SP1.",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Qt (pronounced as \"cute\", not \"cu-tee\") is a cross-platform framework that is usually used as a graphical toolkit, although it is also very helpful in creating CLI applications. It runs on the three major desktop OSes, as well as on mobile OSes, such as Symbian, Nokia Belle, Meego Harmattan, MeeGo or BB10, and on embedded devices. Ports for Android (Necessitas) and iOS are also in development\n\nSecurity Fix(es):\n\nIn Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.(CVE-2023-37369)\n\nAn issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.(CVE-2023-38197)\n\nAn issue was discovered in Qt before 5.15.16, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3 on Windows. When using the GDI font engine, if a corrupted font is loaded via QFontDatabase::addApplicationFont{FromData], then it can cause the application to crash because of missing length checks.(CVE-2023-43114)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for qt is now available for openEuler-22.03-LTS-SP1.\n\nopenEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"High",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"qt",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2023-1877",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1877"
			},
			{
				"summary":"CVE-2023-37369",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-37369&packageName=qt"
			},
			{
				"summary":"CVE-2023-38197",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-38197&packageName=qt"
			},
			{
				"summary":"CVE-2023-43114",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail?cveId=CVE-2023-43114&packageName=qt"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37369"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38197"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-43114"
			},
			{
				"summary":"openEuler-SA-2023-1877 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2023/csaf-openeuler-sa-2023-1877.json"
			}
		],
		"title":"An update for qt is now available for openEuler-22.03-LTS-SP1",
		"tracking":{
			"initial_release_date":"2023-12-01T14:27:24+08:00",
			"revision_history":[
				{
					"date":"2023-12-01T14:27:24+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T14:27:24+08:00",
					"summary":"final",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T14:27:24+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T14:27:24+08:00",
			"id":"openEuler-SA-2023-1877",
			"version":"2.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-devel-4.8.7-58.oe2203sp1.aarch64.rpm",
									"name":"qt-devel-4.8.7-58.oe2203sp1.aarch64.rpm"
								},
								"name":"qt-devel-4.8.7-58.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-debugsource-4.8.7-58.oe2203sp1.aarch64.rpm",
									"name":"qt-debugsource-4.8.7-58.oe2203sp1.aarch64.rpm"
								},
								"name":"qt-debugsource-4.8.7-58.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-debuginfo-4.8.7-58.oe2203sp1.aarch64.rpm",
									"name":"qt-debuginfo-4.8.7-58.oe2203sp1.aarch64.rpm"
								},
								"name":"qt-debuginfo-4.8.7-58.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-4.8.7-58.oe2203sp1.aarch64.rpm",
									"name":"qt-4.8.7-58.oe2203sp1.aarch64.rpm"
								},
								"name":"qt-4.8.7-58.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-4.8.7-58.oe2203sp1.src.rpm",
									"name":"qt-4.8.7-58.oe2203sp1.src.rpm"
								},
								"name":"qt-4.8.7-58.oe2203sp1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-debuginfo-4.8.7-58.oe2203sp1.x86_64.rpm",
									"name":"qt-debuginfo-4.8.7-58.oe2203sp1.x86_64.rpm"
								},
								"name":"qt-debuginfo-4.8.7-58.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-debugsource-4.8.7-58.oe2203sp1.x86_64.rpm",
									"name":"qt-debugsource-4.8.7-58.oe2203sp1.x86_64.rpm"
								},
								"name":"qt-debugsource-4.8.7-58.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-4.8.7-58.oe2203sp1.x86_64.rpm",
									"name":"qt-4.8.7-58.oe2203sp1.x86_64.rpm"
								},
								"name":"qt-4.8.7-58.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"qt-devel-4.8.7-58.oe2203sp1.x86_64.rpm",
									"name":"qt-devel-4.8.7-58.oe2203sp1.x86_64.rpm"
								},
								"name":"qt-devel-4.8.7-58.oe2203sp1.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-devel-4.8.7-58.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
					"name":"qt-devel-4.8.7-58.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-debugsource-4.8.7-58.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
					"name":"qt-debugsource-4.8.7-58.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-debuginfo-4.8.7-58.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
					"name":"qt-debuginfo-4.8.7-58.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-4.8.7-58.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
					"name":"qt-4.8.7-58.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-4.8.7-58.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
					"name":"qt-4.8.7-58.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-debuginfo-4.8.7-58.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
					"name":"qt-debuginfo-4.8.7-58.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-debugsource-4.8.7-58.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
					"name":"qt-debugsource-4.8.7-58.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-4.8.7-58.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
					"name":"qt-4.8.7-58.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"qt-devel-4.8.7-58.oe2203sp1.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64",
					"name":"qt-devel-4.8.7-58.oe2203sp1.x86_64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-37369",
			"notes":[
				{
					"text":"In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					],
					"details":"qt security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1877"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-37369"
		},
		{
			"cve":"CVE-2023-38197",
			"notes":[
				{
					"text":"An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					],
					"details":"qt security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1877"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":7.5,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2023-38197"
		},
		{
			"cve":"CVE-2023-43114",
			"notes":[
				{
					"text":"An issue was discovered in Qt before 5.15.16, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3 on Windows. When using the GDI font engine, if a corrupted font is loaded via QFontDatabase::addApplicationFont{FromData], then it can cause the application to crash because of missing length checks.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
					"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					],
					"details":"qt security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2023-1877"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:qt-debuginfo-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-debugsource-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-4.8.7-58.oe2203sp1.x86_64",
						"openEuler-22.03-LTS-SP1:qt-devel-4.8.7-58.oe2203sp1.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2023-43114"
		}
	]
}