CVE-2025-4211

Publication date 16 May 2025

Last updated 21 May 2025


Ubuntu priority

Improper Link Resolution Before File Access ('Link Following') vulnerability in QFileSystemEngine in the Qt corelib module on Windows which potentially allows Symlink Attacks and the use of Malicious Files. Issue originates from CVE-2024-38081. The vulnerability arises from the use of the GetTempPath API, which can be exploited by attackers to manipulate temporary file paths, potentially leading to unauthorized access and privilege escalation. The affected public API in the Qt Framework is QDir::tempPath() and anything that uses it, such as QStandardPaths with TempLocation, QTemporaryDir, and QTemporaryFile.This issue affects all version of Qt up to and including 5.15.18, from 6.0.0 through 6.5.8, from 6.6.0 through 6.8.1. It is fixed in Qt 5.15.19, Qt 6.5.9, Qt 6.8.2, 6.9.0

Status

Package Ubuntu Release Status
qt6-base 25.04 plucky
Needs evaluation
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal Not in release
qtbase-opensource-src 25.04 plucky Ignored only affect Windows
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble Ignored only affect Windows
22.04 LTS jammy Ignored only affect Windows
20.04 LTS focal Ignored only affect Windows
18.04 LTS bionic Ignored only affect Windows
16.04 LTS xenial Ignored only affect Windows
qtbase-opensource-src-gles 25.04 plucky
Needs evaluation
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble
Needs evaluation
22.04 LTS jammy
Needs evaluation
20.04 LTS focal
Needs evaluation
16.04 LTS xenial
Needs evaluation