Packages
- qtbase-opensource-src - Qt 5 libraries
Details
It was discovered that Qt did not correctly handle OpenSSL's error queue.
An attacker could possibly use this issue to cause a denial of service.
This issue was only addressed in Ubuntu 20.04 LTS. (CVE-2020-13962)
It was discovered that Qt incorrectly handled certain XBM image files. If a
user or automated system were tricked into opening a specially crafted PPM
file, a remote attacker could cause Qt to crash, resulting in a denial of
service. This issue was only addressed in Ubuntu 16.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-17507)
It was discovered that Qt did not correctly handle executing specific
binaries. If a user or automated system were tricked into executing a
binary at a specific file path, an attacker could cause a denial of
service or execute arbitrary code. This issue was only addressed in
Ubuntu 20.04 LTS. (
It was discovered that Qt did not correctly handle OpenSSL's error queue.
An attacker could possibly use this issue to cause a denial of service.
This issue was only addressed in Ubuntu 20.04 LTS. (CVE-2020-13962)
It was discovered that Qt incorrectly handled certain XBM image files. If a
user or automated system were tricked into opening a specially crafted PPM
file, a remote attacker could cause Qt to crash, resulting in a denial of
service. This issue was only addressed in Ubuntu 16.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-17507)
It was discovered that Qt did not correctly handle executing specific
binaries. If a user or automated system were tricked into executing a
binary at a specific file path, an attacker could cause a denial of
service or execute arbitrary code. This issue was only addressed in
Ubuntu 20.04 LTS. (CVE-2022-25255)
It was discovered that Qt did not correctly handle certain integer
arithmetic. An attacker could possibly use this issue to cause a denial
of service. This issue was only addressed in Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2023-51714)
It was discovered that Qt did not correctly handle certain encrypted
connections. An attacker could possibly use this issue to leak sensitive
information. This issue was only addressed in Ubuntu 24.04 LTS.
(CVE-2024-39936)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
| Ubuntu Release | Package Version | ||
|---|---|---|---|
| 24.04 LTS noble | libqt5core5t64 – 5.15.13+dfsg-1ubuntu1+esm1 | ||
| libqt5gui5t64 – 5.15.13+dfsg-1ubuntu1+esm1 | |||
| 22.04 LTS jammy | libqt5core5a – 5.15.3+dfsg-2ubuntu0.2+esm3 | ||
| libqt5gui5 – 5.15.3+dfsg-2ubuntu0.2+esm3 | |||
| 20.04 LTS focal | libqt5core5a – 5.12.8+dfsg-0ubuntu2.1+esm3 | ||
| libqt5gui5 – 5.12.8+dfsg-0ubuntu2.1+esm3 | |||
| 18.04 LTS bionic | libqt5core5a – 5.9.5+dfsg-0ubuntu2.6+esm2 | ||
| libqt5gui5 – 5.9.5+dfsg-0ubuntu2.6+esm2 | |||
| 16.04 LTS xenial | libqt5core5a – 5.5.1+dfsg-16ubuntu7.7+esm2 | ||
| libqt5gui5 – 5.5.1+dfsg-16ubuntu7.7+esm2 | |||
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.