{"id":"MGASA-2014-0115","summary":"Updated qt5 packages fix security vulnerability.","details":"It was discovered that QXmlSimpleReader in Qt incorrectly handled XML\nentity expansion. An attacker could use this flaw to cause Qt applications\nto consume large amounts of resources, resulting in a denial of service\n(CVE-2013-4549)\n","modified":"2026-04-16T06:24:32.547107226Z","published":"2014-03-03T19:58:12Z","upstream":["CVE-2013-4549"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0115.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=12178"},{"type":"WEB","url":"http://lists.qt-project.org/pipermail/announce/2013-December/000036.html"},{"type":"WEB","url":"http://www.ubuntu.com/usn/usn-2057-1/"}],"affected":[{"package":{"name":"qtbase5","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/qtbase5?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.0.2-1.1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0115.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}