CVE-2025-5455

NameCVE-2025-5455
DescriptionAn issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qt6-base (PTS)bookworm6.4.2+dfsg-10vulnerable
trixie6.8.2+dfsg-6vulnerable
sid6.8.2+dfsg-7vulnerable
qtbase-opensource-src (PTS)bullseye5.15.2+dfsg-9+deb11u1vulnerable
bookworm5.15.8+dfsg-11+deb12u3vulnerable
trixie, sid5.15.15+dfsg-5vulnerable
qtbase-opensource-src-gles (PTS)bullseye5.15.2+dfsg-4vulnerable
bookworm5.15.8+dfsg-3vulnerable
trixie, sid5.15.15+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qt6-basesource(unstable)(unfixed)
qtbase-opensource-srcsource(unstable)(unfixed)
qtbase-opensource-src-glessource(unstable)(unfixed)

Notes

[bookworm] - qt6-base <no-dsa> (Minor issue)
[bookworm] - qtbase-opensource-src <no-dsa> (Minor issue)
[bullseye] - qtbase-opensource-src <postponed> (Minor issue; DoS for local user)
[bookworm] - qtbase-opensource-src-gles <no-dsa> (Minor issue)
[bullseye] - qtbase-opensource-src-gles <postponed> (Minor issue; DoS for local user)
https://codereview.qt-project.org/c/qt/qtbase/+/642006

Search for package or bug name: Reporting problems
OSZAR »