Show plain JSON{"affected_release": [{"advisory": "RHSA-2024:4647", "cpe": "cpe:/o:redhat:rhel_els:7", "package": "qt5-qtbase-0:5.9.7-6.el7_9", "product_name": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4617", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "qt5-qtbase-0:5.15.3-8.el8_10", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4646", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "qt5-qtbase-0:5.12.5-5.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-07-19T00:00:00Z"}, {"advisory": "RHSA-2024:4621", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "qt5-qtbase-0:5.12.5-9.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4621", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "qt5-qtbase-0:5.12.5-9.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4621", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "qt5-qtbase-0:5.12.5-9.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4644", "cpe": "cpe:/a:redhat:rhel_aus:8.6", "package": "qt5-qtbase-0:5.15.2-5.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4644", "cpe": "cpe:/a:redhat:rhel_tus:8.6", "package": "qt5-qtbase-0:5.15.2-5.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4644", "cpe": "cpe:/a:redhat:rhel_e4s:8.6", "package": "qt5-qtbase-0:5.15.2-5.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4639", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "qt5-qtbase-0:5.15.3-2.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4623", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "qt5-qtbase-0:5.15.9-10.el9_4", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-07-18T00:00:00Z"}, {"advisory": "RHSA-2024:4645", "cpe": "cpe:/a:redhat:rhel_e4s:9.0", "package": "qt5-qtbase-0:5.15.2-30.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions", "release_date": "2024-07-19T00:00:00Z"}, {"advisory": "RHSA-2024:4638", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "qt5-qtbase-0:5.15.3-2.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-07-18T00:00:00Z"}], "bugzilla": {"description": "qtbase: qtbase: Delay any communication until encrypted() can be responded to", "id": "2295867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2295867"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "status": "verified"}, "cwe": "CWE-367", "details": ["An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..", "A vulnerability was found in Qt where, during a TLS connection for servers supporting HTTP2, Qt may send data to a server even if the TLS certificate doesn't match the redirected address. This occurs because Qt fails to validate the certificate against the redirected address, potentially sending data to an incorrect or malicious server."], "mitigation": {"lang": "en:us", "value": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible."}, "name": "CVE-2024-39936", "public_date": "2024-07-04T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2024-39936\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-39936\nhttps://codereview.qt-project.org/c/qt/qtbase/+/571601"], "statement": "This flaw occurs because Qt does not properly validate the certificate against the redirected address, potentially leading to sensitive data being sent to an unintended or malicious server. Given the potential for significant data exposure, this issue is considered important.", "threat_severity": "Important"}