{"schema_version":"1.7.2","id":"OESA-2025-1655","modified":"2025-06-20T13:26:36Z","published":"2025-06-20T13:26:36Z","upstream":["CVE-2025-5455"],"summary":"qt6-qtbase security update","details":"Qt is a software toolkit for developing applications.\r\n\r\nSecurity Fix(es):\n\nAn issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.\n\nIf the function was called with malformed data, for example, an URL that\ncontained a \u0026quot;charset\u0026quot; parameter that lacked a value (such as\n\u0026quot;data:charset,\u0026quot;), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service\n(abort).\n\nThis impacts Qt up to 5.15.18, 6.0.0-\u0026gt;6.5.8, 6.6.0-\u0026gt;6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.(CVE-2025-5455)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"qt6-qtbase","purl":"pkg:rpm/openEuler/qt6-qtbase\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.5.2-11.oe2403"}]}],"ecosystem_specific":{"aarch64":["qt6-qtbase-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-debuginfo-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-debugsource-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-devel-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-examples-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-gui-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-ibase-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-mysql-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-odbc-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-postgresql-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-private-devel-6.5.2-11.oe2403.aarch64.rpm","qt6-qtbase-static-6.5.2-11.oe2403.aarch64.rpm"],"noarch":["qt6-qtbase-common-6.5.2-11.oe2403.noarch.rpm"],"src":["qt6-qtbase-6.5.2-11.oe2403.src.rpm"],"x86_64":["qt6-qtbase-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-debuginfo-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-debugsource-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-devel-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-examples-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-gui-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-ibase-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-mysql-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-odbc-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-postgresql-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-private-devel-6.5.2-11.oe2403.x86_64.rpm","qt6-qtbase-static-6.5.2-11.oe2403.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1655"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5455"}],"database_specific":{"severity":"High"}}