{"id":"CVE-2018-19872","details":"An issue was discovered in Qt 5.11. A malformed PPM image causes a division by zero and a crash in qppmhandler.cpp.","modified":"2026-04-02T01:13:15.345542Z","published":"2019-03-21T16:00:32.953Z","related":["ALSA-2020:1665","MGASA-2019-0161","SUSE-SU-2019:0927-1","SUSE-SU-2020:0317-1","SUSE-SU-2020:0318-1","SUSE-SU-2020:0319-1","openSUSE-SU-2019:1239-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FO7IBY7YYKNMRD5OI3JNNUI42WEM7NUV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XS6G3ZDFCHWFQD4CFXWFPHREOHBBDTD7/"},{"type":"WEB","url":"https://usn.ubuntu.com/4275-1/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00024.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2C5FHCR4A636BLTAXL76WWDJLOAHGNYG/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00080.html"},{"type":"FIX","url":"http://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/"},{"type":"FIX","url":"https://bugreports.qt.io/browse/QTBUG-69449"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qt/qtbase","events":[{"introduced":"0"},{"last_affected":"6eef81ee1c82f934e14d47047d8b6103b8755321"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.11.0"}]}}],"versions":["qt-v5.0.0-alpha1","v5.0.0","v5.0.0-beta1","v5.0.0-beta2","v5.0.0-rc1","v5.0.0-rc2","v5.0.1","v5.0.2","v5.1.0","v5.1.0-alpha1","v5.1.0-beta1","v5.1.0-rc1","v5.1.0-rc2","v5.1.1","v5.10.0","v5.10.0-alpha1","v5.10.0-beta1","v5.10.0-beta2","v5.10.0-beta3","v5.10.0-beta4","v5.10.0-rc1","v5.10.0-rc2","v5.10.0-rc3","v5.10.1","v5.11.0","v5.11.0-alpha1","v5.11.0-beta1","v5.11.0-beta2","v5.11.0-beta3","v5.11.0-beta4","v5.11.0-rc1","v5.11.0-rc2","v5.2.0","v5.2.0-alpha1","v5.2.0-beta1","v5.2.0-rc1","v5.2.1","v5.3.0","v5.3.0-alpha1","v5.3.0-beta1","v5.3.0-rc1","v5.3.1","v5.3.2","v5.4.0","v5.4.0-alpha1","v5.4.0-beta1","v5.4.0-rc1","v5.4.1","v5.4.2","v5.5.0","v5.5.0-alpha1","v5.5.0-beta1","v5.5.0-rc1","v5.5.1","v5.6.0","v5.6.0-alpha1","v5.6.0-beta1","v5.6.0-rc1","v5.6.1","v5.6.1-1","v5.6.2","v5.6.3","v5.7.0","v5.7.0-alpha1","v5.7.0-beta1","v5.7.0-rc1","v5.7.1","v5.8.0","v5.8.0-alpha1","v5.8.0-beta1","v5.8.0-rc1","v5.9.0","v5.9.0-alpha1","v5.9.0-beta1","v5.9.0-beta2","v5.9.0-beta3","v5.9.0-beta4","v5.9.0-rc1","v5.9.0-rc2","v5.9.1","v5.9.2","v5.9.3","v5.9.4","v5.9.5","v5.9.6","v5.9.7","v5.9.8","v5.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19872.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"15.0"}]},{"events":[{"introduced":"0"},{"last_affected":"28"}]},{"events":[{"introduced":"0"},{"last_affected":"29"}]},{"events":[{"introduced":"0"},{"last_affected":"30"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}