vulnerability

Rocky Linux: CVE-2025-5455: qt6-qtbase (Multiple Advisories)

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:C)
Published
Oct 3, 2025
Added
Oct 6, 2025
Modified
Oct 24, 2025

Description

An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code.

If the function was called with malformed data, for example, an URL that
contained a "charset" parameter that lacked a value (such as
"data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service
(abort).

This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.

Solutions

rocky-upgrade-qt5-qtbaserocky-upgrade-qt5-qtbase-debuginforocky-upgrade-qt5-qtbase-debugsourcerocky-upgrade-qt5-qtbase-develrocky-upgrade-qt5-qtbase-devel-debuginforocky-upgrade-qt5-qtbase-examplesrocky-upgrade-qt5-qtbase-examples-debuginforocky-upgrade-qt5-qtbase-guirocky-upgrade-qt5-qtbase-gui-debuginforocky-upgrade-qt5-qtbase-mysqlrocky-upgrade-qt5-qtbase-mysql-debuginforocky-upgrade-qt5-qtbase-odbcrocky-upgrade-qt5-qtbase-odbc-debuginforocky-upgrade-qt5-qtbase-postgresqlrocky-upgrade-qt5-qtbase-postgresql-debuginforocky-upgrade-qt5-qtbase-private-develrocky-upgrade-qt5-qtbase-staticrocky-upgrade-qt6-qtbaserocky-upgrade-qt6-qtbase-debuginforocky-upgrade-qt6-qtbase-debugsourcerocky-upgrade-qt6-qtbase-develrocky-upgrade-qt6-qtbase-devel-debuginforocky-upgrade-qt6-qtbase-examplesrocky-upgrade-qt6-qtbase-examples-debuginforocky-upgrade-qt6-qtbase-guirocky-upgrade-qt6-qtbase-gui-debuginforocky-upgrade-qt6-qtbase-mysqlrocky-upgrade-qt6-qtbase-mysql-debuginforocky-upgrade-qt6-qtbase-odbcrocky-upgrade-qt6-qtbase-odbc-debuginforocky-upgrade-qt6-qtbase-postgresqlrocky-upgrade-qt6-qtbase-postgresql-debuginforocky-upgrade-qt6-qtbase-private-develrocky-upgrade-qt6-qtbase-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.