{"id":"USN-5081-1","summary":"qtbase-opensource-src vulnerabilities","details":"It was discovered that Qt incorrectly handled certain XBM image files. If a\nuser or automated system were tricked into opening a specially crafted PPM\nfile, a remote attacker could cause Qt to crash, resulting in a denial of\nservice. (CVE-2020-17507)\n\nIt was discovered that Qt incorrectly handled certain graphics operations.\nIf a user or automated system were tricked into performing certain graphics\noperations, a remote attacker could cause Qt to crash, resulting in a\ndenial of service. (CVE-2021-38593)\n","modified":"2026-02-10T04:42:19Z","published":"2021-09-16T16:34:02Z","related":["UBUNTU-CVE-2020-17507","UBUNTU-CVE-2021-38593"],"upstream":["CVE-2020-17507","CVE-2021-38593","UBUNTU-CVE-2020-17507","UBUNTU-CVE-2021-38593"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5081-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-17507"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2021-38593"}],"affected":[{"package":{"name":"qtbase-opensource-src","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/qtbase-opensource-src@5.9.5+dfsg-0ubuntu2.6?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5.9.5+dfsg-0ubuntu2.6"}]}],"versions":["5.9.1+dfsg-10ubuntu1","5.9.1+dfsg-10ubuntu2","5.9.2+dfsg-4ubuntu6","5.9.3+dfsg-0ubuntu1","5.9.3+dfsg-0ubuntu3","5.9.3+dfsg-0ubuntu4","5.9.4+dfsg-0ubuntu3","5.9.4+dfsg-0ubuntu4","5.9.5+dfsg-0ubuntu1","5.9.5+dfsg-0ubuntu2","5.9.5+dfsg-0ubuntu2.1","5.9.5+dfsg-0ubuntu2.3","5.9.5+dfsg-0ubuntu2.4","5.9.5+dfsg-0ubuntu2.5"],"ecosystem_specific":{"binaries":[{"binary_name":"libqt5concurrent5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5core5a","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5dbus5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5gui5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5network5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5opengl5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5opengl5-dev","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5printsupport5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-ibase","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-mysql","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-odbc","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-psql","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-sqlite","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5sql5-tds","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5test5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5widgets5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"libqt5xml5","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qt5-default","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qt5-gtk-platformtheme","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qt5-qmake","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qt5-qmake-bin","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qtbase5-dev","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qtbase5-dev-tools","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qtbase5-doc-html","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qtbase5-examples","binary_version":"5.9.5+dfsg-0ubuntu2.6"},{"binary_name":"qtbase5-private-dev","binary_version":"5.9.5+dfsg-0ubuntu2.6"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5081-1.json","cves_map":{"cves":[{"id":"CVE-2020-17507","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}]},{"id":"CVE-2021-38593","severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}]}],"ecosystem":"Ubuntu:18.04:LTS"}}}],"schema_version":"1.7.3"}