{"schema_version":"1.7.2","id":"OESA-2024-1538","modified":"2024-05-10T11:07:54Z","published":"2024-05-10T11:07:54Z","upstream":["CVE-2023-45935","CVE-2024-25580"],"summary":"qt5-qtbase security update","details":"This package provides base tools, such as string, xml, and network handling.\r\n\r\nSecurity Fix(es):\r\n\r\nQt 6 through 6.6 was discovered to contain a NULL pointer dereference via the function QXcbConnection::initializeAllAtoms(). NOTE: this is disputed because it is not expected that an X application should continue to run when there is arbitrary anomalous behavior from the X server.(CVE-2023-45935)\r\n\r\nAn issue was discovered in gui/util/qktxhandler.cpp in Qt before 5.15.17, 6.x before 6.2.12, 6.3.x through 6.5.x before 6.5.5, and 6.6.x before 6.6.2. A buffer overflow and application crash can occur via a crafted KTX image file.(CVE-2024-25580)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"qt5-qtbase","purl":"pkg:rpm/openEuler/qt5-qtbase\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.15.2-16.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["qt5-qtbase-gui-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-debuginfo-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-odbc-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-postgresql-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-examples-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-devel-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-mysql-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-private-devel-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-static-5.15.2-16.oe2203sp3.aarch64.rpm","qt5-qtbase-debugsource-5.15.2-16.oe2203sp3.aarch64.rpm"],"noarch":["qt5-qtbase-common-5.15.2-16.oe2203sp3.noarch.rpm"],"src":["qt5-qtbase-5.15.2-16.oe2203sp3.src.rpm"],"x86_64":["qt5-qtbase-odbc-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-postgresql-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-private-devel-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-gui-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-static-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-debugsource-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-examples-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-devel-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-debuginfo-5.15.2-16.oe2203sp3.x86_64.rpm","qt5-qtbase-mysql-5.15.2-16.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1538"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45935"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-25580"}],"database_specific":{"severity":"Low"}}