suse-su-2025:02968-1
Vulnerability from csaf_suse
Published
2025-08-25 06:20
Modified
2025-08-25 06:20
Summary
Security update for libqt4
Notes
Title of the patch
Security update for libqt4
Description of the patch
This update for libqt4 fixes the following issues:
- CVE-2021-45930: Fixed out-of-bounds write leading to DoS (bsc#1196654)
- CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm (bsc#1211298)
- CVE-2023-32763: Fixed buffer overflow on QTextLayout during rendering of an SVG file with an image inside (bsc#1211798)
- CVE-2023-34410: Fixed certificate validation not always considering whether the root of a chain is a configured CA certificate (bsc#1211994)
- CVE-2023-37369: Fixed buffer overflow in QXmlStreamReader (bsc#1214327)
- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader (bsc#1213326)
- CVE-2025-5455: Fixed denial of service when qDecodeDataUrl() is called with malformed data and assertions are enabled (bsc#1245609)
Patchnames
SUSE-2025-2968,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2968
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for libqt4", "title": "Title of the patch" }, { "category": "description", "text": "This update for libqt4 fixes the following issues:\n\n- CVE-2021-45930: Fixed out-of-bounds write leading to DoS (bsc#1196654)\n- CVE-2023-32573: Fixed missing initialization of QtSvg QSvgFont m_unitsPerEm (bsc#1211298)\n- CVE-2023-32763: Fixed buffer overflow on QTextLayout during rendering of an SVG file with an image inside (bsc#1211798)\n- CVE-2023-34410: Fixed certificate validation not always considering whether the root of a chain is a configured CA certificate (bsc#1211994)\n- CVE-2023-37369: Fixed buffer overflow in QXmlStreamReader (bsc#1214327)\n- CVE-2023-38197: Fixed infinite loops in QXmlStreamReader (bsc#1213326)\n- CVE-2025-5455: Fixed denial of service when qDecodeDataUrl() is called with malformed data and assertions are enabled (bsc#1245609)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2968,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2968", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02968-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02968-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502968-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02968-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041344.html" }, { "category": "self", "summary": "SUSE Bug 1196654", "url": "https://bugzilla.suse.com/1196654" }, { "category": "self", "summary": "SUSE Bug 1211298", "url": "https://bugzilla.suse.com/1211298" }, { "category": "self", "summary": "SUSE Bug 1211798", "url": "https://bugzilla.suse.com/1211798" }, { "category": "self", "summary": "SUSE Bug 1211994", "url": "https://bugzilla.suse.com/1211994" }, { "category": "self", "summary": "SUSE Bug 1213326", "url": "https://bugzilla.suse.com/1213326" }, { "category": "self", "summary": "SUSE Bug 1214327", "url": "https://bugzilla.suse.com/1214327" }, { "category": "self", "summary": "SUSE Bug 1245609", "url": "https://bugzilla.suse.com/1245609" }, { "category": "self", "summary": "SUSE Bug 357727", "url": "https://bugzilla.suse.com/357727" }, { "category": "self", "summary": "SUSE Bug 552218", "url": "https://bugzilla.suse.com/552218" }, { "category": "self", "summary": "SUSE Bug 656144", "url": "https://bugzilla.suse.com/656144" }, { "category": "self", "summary": "SUSE Bug 717127", "url": "https://bugzilla.suse.com/717127" }, { "category": "self", "summary": "SUSE Bug 875470", "url": "https://bugzilla.suse.com/875470" }, { "category": "self", "summary": "SUSE CVE CVE-2021-45930 page", "url": "https://www.suse.com/security/cve/CVE-2021-45930/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-32573 page", "url": "https://www.suse.com/security/cve/CVE-2023-32573/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-32763 page", "url": "https://www.suse.com/security/cve/CVE-2023-32763/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-34410 page", "url": "https://www.suse.com/security/cve/CVE-2023-34410/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-37369 page", "url": "https://www.suse.com/security/cve/CVE-2023-37369/" }, { "category": "self", "summary": "SUSE CVE CVE-2023-38197 page", "url": "https://www.suse.com/security/cve/CVE-2023-38197/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-5455 page", "url": "https://www.suse.com/security/cve/CVE-2025-5455/" } ], "title": "Security update for libqt4", "tracking": { "current_release_date": "2025-08-25T06:20:49Z", "generator": { "date": "2025-08-25T06:20:49Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02968-1", "initial_release_date": "2025-08-25T06:20:49Z", "revision_history": [ { "date": "2025-08-25T06:20:49Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-4.8.7-8.22.1.aarch64", "product_id": "libqt4-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-devel-4.8.7-8.22.1.aarch64", "product_id": "libqt4-devel-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.aarch64", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.aarch64", "product_id": "libqt4-linguist-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.aarch64", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.aarch64", "product_id": "libqt4-qt3support-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-sql-4.8.7-8.22.1.aarch64", "product_id": "libqt4-sql-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.aarch64", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.aarch64", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.aarch64", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.aarch64", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.aarch64", "product": { "name": "libqt4-x11-4.8.7-8.22.1.aarch64", "product_id": "libqt4-x11-4.8.7-8.22.1.aarch64" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.aarch64", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.aarch64", "product_id": "qt4-x11-tools-4.8.7-8.22.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libqt4-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-devel-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-devel-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-devel-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-qt3support-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-qt3support-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-qt3support-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-sql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-sql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-sql-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-sql-mysql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-sql-mysql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-sql-mysql-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-sql-postgresql-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-sql-postgresql-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-sql-sqlite-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-sql-sqlite-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-sql-unixODBC-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-sql-unixODBC-64bit-4.8.7-8.22.1.aarch64_ilp32" } }, { "category": "product_version", "name": "libqt4-x11-64bit-4.8.7-8.22.1.aarch64_ilp32", "product": { "name": "libqt4-x11-64bit-4.8.7-8.22.1.aarch64_ilp32", "product_id": "libqt4-x11-64bit-4.8.7-8.22.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.i586", "product": { "name": "libqt4-4.8.7-8.22.1.i586", "product_id": "libqt4-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.i586", "product": { "name": "libqt4-devel-4.8.7-8.22.1.i586", "product_id": "libqt4-devel-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.i586", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.i586", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.i586", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.i586", "product_id": "libqt4-linguist-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.i586", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.i586", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.i586", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.i586", "product_id": "libqt4-qt3support-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.i586", "product": { "name": "libqt4-sql-4.8.7-8.22.1.i586", "product_id": "libqt4-sql-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.i586", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.i586", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.i586", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.i586", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.i586", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.i586", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.i586", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.i586", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.i586", "product": { "name": "libqt4-x11-4.8.7-8.22.1.i586", "product_id": "libqt4-x11-4.8.7-8.22.1.i586" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.i586", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.i586", "product_id": "qt4-x11-tools-4.8.7-8.22.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "product": { "name": "libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "product_id": "libqt4-devel-doc-data-4.8.7-8.22.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-devel-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-devel-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-linguist-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-qt3support-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-sql-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-sql-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.ppc64le", "product": { "name": "libqt4-x11-4.8.7-8.22.1.ppc64le", "product_id": "libqt4-x11-4.8.7-8.22.1.ppc64le" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.ppc64le", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.ppc64le", "product_id": "qt4-x11-tools-4.8.7-8.22.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.s390", "product": { "name": "libqt4-4.8.7-8.22.1.s390", "product_id": "libqt4-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.s390", "product": { "name": "libqt4-devel-4.8.7-8.22.1.s390", "product_id": "libqt4-devel-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.s390", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.s390", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.s390", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.s390", "product_id": "libqt4-linguist-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.s390", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.s390", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.s390", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.s390", "product_id": "libqt4-qt3support-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.s390", "product": { "name": "libqt4-sql-4.8.7-8.22.1.s390", "product_id": "libqt4-sql-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.s390", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.s390", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.s390", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.s390", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.s390", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.s390", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.s390", "product": { "name": "libqt4-x11-4.8.7-8.22.1.s390", "product_id": "libqt4-x11-4.8.7-8.22.1.s390" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.s390", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.s390", "product_id": "qt4-x11-tools-4.8.7-8.22.1.s390" } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-4.8.7-8.22.1.s390x", "product_id": "libqt4-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-devel-4.8.7-8.22.1.s390x", "product_id": "libqt4-devel-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-devel-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-devel-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-devel-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.s390x", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.s390x", "product_id": "libqt4-linguist-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.s390x", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.s390x", "product_id": "libqt4-qt3support-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-qt3support-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-qt3support-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-qt3support-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-x11-4.8.7-8.22.1.s390x", "product_id": "libqt4-x11-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "libqt4-x11-32bit-4.8.7-8.22.1.s390x", "product": { "name": "libqt4-x11-32bit-4.8.7-8.22.1.s390x", "product_id": "libqt4-x11-32bit-4.8.7-8.22.1.s390x" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.s390x", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.s390x", "product_id": "qt4-x11-tools-4.8.7-8.22.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libqt4-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-4.8.7-8.22.1.x86_64", "product_id": "libqt4-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-devel-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-devel-4.8.7-8.22.1.x86_64", "product_id": "libqt4-devel-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-devel-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-devel-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-devel-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-devel-doc-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-devel-doc-4.8.7-8.22.1.x86_64", "product_id": "libqt4-devel-doc-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-linguist-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-linguist-4.8.7-8.22.1.x86_64", "product_id": "libqt4-linguist-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "product_id": "libqt4-private-headers-devel-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-qt3support-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-qt3support-4.8.7-8.22.1.x86_64", "product_id": "libqt4-qt3support-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-mysql-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-mysql-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-postgresql-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-postgresql-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-postgresql-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-sqlite-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-sqlite-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-unixODBC-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-unixODBC-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-sql-unixODBC-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-x11-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-x11-4.8.7-8.22.1.x86_64", "product_id": "libqt4-x11-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "product": { "name": "libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "product_id": "libqt4-x11-32bit-4.8.7-8.22.1.x86_64" } }, { "category": "product_version", "name": "qt4-x11-tools-4.8.7-8.22.1.x86_64", "product": { "name": "qt4-x11-tools-4.8.7-8.22.1.x86_64", "product_id": "qt4-x11-tools-4.8.7-8.22.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product": { "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libqt4-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-32bit-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-32bit-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-devel-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-devel-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-devel-doc-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-devel-doc-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-devel-doc-data-4.8.7-8.22.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch" }, "product_reference": "libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-private-headers-devel-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-qt3support-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-qt3support-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-sql-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-sql-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-sql-32bit-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-sql-mysql-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-sql-sqlite-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-x11-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-x11-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "libqt4-x11-32bit-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64" }, "product_reference": "libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" }, { "category": "default_component_of", "full_product_name": { "name": "qt4-x11-tools-4.8.7-8.22.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5", "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" }, "product_reference": "qt4-x11-tools-4.8.7-8.22.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-45930", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-45930" } ], "notes": [ { "category": "general", "text": "Qt SVG in Qt 5.0.0 through 5.15.2 and 6.0.0 through 6.2.1 has an out-of-bounds write in QtPrivate::QCommonArrayOps\u003cQPainterPath::Element\u003e::growAppend (called from QPainterPath::addPath and QPathClipper::intersect).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-45930", "url": "https://www.suse.com/security/cve/CVE-2021-45930" }, { "category": "external", "summary": "SUSE Bug 1196654 for CVE-2021-45930", "url": "https://bugzilla.suse.com/1196654" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2021-45930" }, { "cve": "CVE-2023-32573", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-32573" } ], "notes": [ { "category": "general", "text": "In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-32573", "url": "https://www.suse.com/security/cve/CVE-2023-32573" }, { "category": "external", "summary": "SUSE Bug 1211298 for CVE-2023-32573", "url": "https://bugzilla.suse.com/1211298" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2023-32573" }, { "cve": "CVE-2023-32763", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-32763" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-32763", "url": "https://www.suse.com/security/cve/CVE-2023-32763" }, { "category": "external", "summary": "SUSE Bug 1211798 for CVE-2023-32763", "url": "https://bugzilla.suse.com/1211798" }, { "category": "external", "summary": "SUSE Bug 1212745 for CVE-2023-32763", "url": "https://bugzilla.suse.com/1212745" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "important" } ], "title": "CVE-2023-32763" }, { "cve": "CVE-2023-34410", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-34410" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2. Certificate validation for TLS does not always consider whether the root of a chain is a configured CA certificate.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-34410", "url": "https://www.suse.com/security/cve/CVE-2023-34410" }, { "category": "external", "summary": "SUSE Bug 1211994 for CVE-2023-34410", "url": "https://bugzilla.suse.com/1211994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2023-34410" }, { "cve": "CVE-2023-37369", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-37369" } ], "notes": [ { "category": "general", "text": "In Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.2, there can be an application crash in QXmlStreamReader via a crafted XML string that triggers a situation in which a prefix is greater than a length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-37369", "url": "https://www.suse.com/security/cve/CVE-2023-37369" }, { "category": "external", "summary": "SUSE Bug 1214327 for CVE-2023-37369", "url": "https://bugzilla.suse.com/1214327" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2023-37369" }, { "cve": "CVE-2023-38197", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2023-38197" } ], "notes": [ { "category": "general", "text": "An issue was discovered in Qt before 5.15.15, 6.x before 6.2.10, and 6.3.x through 6.5.x before 6.5.3. There are infinite loops in recursive entity expansion.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2023-38197", "url": "https://www.suse.com/security/cve/CVE-2023-38197" }, { "category": "external", "summary": "SUSE Bug 1213326 for CVE-2023-38197", "url": "https://bugzilla.suse.com/1213326" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2023-38197" }, { "cve": "CVE-2025-5455", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-5455" } ], "notes": [ { "category": "general", "text": "An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.\n\nIf the function was called with malformed data, for example, an URL that\ncontained a \"charset\" parameter that lacked a value (such as\n\"data:charset,\"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service\n(abort).\n\nThis impacts Qt up to 5.15.18, 6.0.0-\u003e6.5.8, 6.6.0-\u003e6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-5455", "url": "https://www.suse.com/security/cve/CVE-2025-5455" }, { "category": "external", "summary": "SUSE Bug 1243958 for CVE-2025-5455", "url": "https://bugzilla.suse.com/1243958" }, { "category": "external", "summary": "SUSE Bug 1245610 for CVE-2025-5455", "url": "https://bugzilla.suse.com/1245610" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-devel-doc-data-4.8.7-8.22.1.noarch", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-private-headers-devel-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-qt3support-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-mysql-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-sql-sqlite-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-32bit-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libqt4-x11-4.8.7-8.22.1.x86_64", "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:qt4-x11-tools-4.8.7-8.22.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-25T06:20:49Z", "details": "moderate" } ], "title": "CVE-2025-5455" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…