USN-8076-1: Qt vulnerabilities

Publication date

5 March 2026

Overview

Several security issues were fixed in Qt.


Packages

Details

It was discovered that Qt did not correctly handle OpenSSL's error queue.
An attacker could possibly use this issue to cause a denial of service.
This issue was only addressed in Ubuntu 20.04 LTS. (CVE-2020-13962)

It was discovered that Qt incorrectly handled certain XBM image files. If a
user or automated system were tricked into opening a specially crafted PPM
file, a remote attacker could cause Qt to crash, resulting in a denial of
service. This issue was only addressed in Ubuntu 16.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-17507)

It was discovered that Qt did not correctly handle executing specific
binaries. If a user or automated system were tricked into executing a
binary at a specific file path, an attacker could cause a denial of
service or execute arbitrary code. This issue was only addressed in
Ubuntu 20.04 LTS. (

It was discovered that Qt did not correctly handle OpenSSL's error queue.
An attacker could possibly use this issue to cause a denial of service.
This issue was only addressed in Ubuntu 20.04 LTS. (CVE-2020-13962)

It was discovered that Qt incorrectly handled certain XBM image files. If a
user or automated system were tricked into opening a specially crafted PPM
file, a remote attacker could cause Qt to crash, resulting in a denial of
service. This issue was only addressed in Ubuntu 16.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-17507)

It was discovered that Qt did not correctly handle executing specific
binaries. If a user or automated system were tricked into executing a
binary at a specific file path, an attacker could cause a denial of
service or execute arbitrary code. This issue was only addressed in
Ubuntu 20.04 LTS. (CVE-2022-25255)

It was discovered that Qt did not correctly handle certain integer
arithmetic. An attacker could possibly use this issue to cause a denial
of service. This issue was only addressed in Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-51714)

It was discovered that Qt did not correctly handle certain encrypted
connections. An attacker could possibly use this issue to leak sensitive
information. This issue was only addressed in Ubuntu 24.04 LTS.
(CVE-2024-39936)


Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
24.04 LTS noble libqt5core5t64 –  5.15.13+dfsg-1ubuntu1+esm1  
libqt5gui5t64 –  5.15.13+dfsg-1ubuntu1+esm1  
22.04 LTS jammy libqt5core5a –  5.15.3+dfsg-2ubuntu0.2+esm3  
libqt5gui5 –  5.15.3+dfsg-2ubuntu0.2+esm3  
20.04 LTS focal libqt5core5a –  5.12.8+dfsg-0ubuntu2.1+esm3  
libqt5gui5 –  5.12.8+dfsg-0ubuntu2.1+esm3  
18.04 LTS bionic libqt5core5a –  5.9.5+dfsg-0ubuntu2.6+esm2  
libqt5gui5 –  5.9.5+dfsg-0ubuntu2.6+esm2  
16.04 LTS xenial libqt5core5a –  5.5.1+dfsg-16ubuntu7.7+esm2  
libqt5gui5 –  5.5.1+dfsg-16ubuntu7.7+esm2  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›