{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2025-3159: fix heap-based buffer overflow in\n  Assimp::ASE::Parser::ParseLV4MeshBonesVertices function of ASE File Handler",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2025/clsa-2025_1763033515.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-16T09:48:37Z",
      "generator": {
        "date": "2026-02-16T09:48:37Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1763033515",
      "initial_release_date": "2025-11-13T11:32:39Z",
      "revision_history": [
        {
          "date": "2025-11-13T11:32:39Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-02-16T09:48:37Z",
          "number": "2",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "qt5-qt3d: Fix of CVE-2025-3159"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
                "product": {
                  "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
                  "product_id": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d@5.15.3-1.el9.tuxcare.els2?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
                "product": {
                  "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
                  "product_id": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d-devel@5.15.3-1.el9.tuxcare.els2?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                "product": {
                  "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_id": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d@5.15.3-1.el9.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                "product": {
                  "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_id": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d-devel@5.15.3-1.el9.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                "product": {
                  "name": "qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_id": "qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d-examples@5.15.3-1.el9.tuxcare.els2?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                "product": {
                  "name": "qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_id": "qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/qt5-qt3d-tests@5.15.3-1.el9.tuxcare.els2?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686"
        },
        "product_reference": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        },
        "product_reference": "qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        },
        "product_reference": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686"
        },
        "product_reference": "qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        },
        "product_reference": "qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        },
        "product_reference": "qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-3159",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASE::Parser::ParseLV4MeshBonesVertices of the file code/AssetLib/ASE/ASEParser.cpp of the component ASE File Handler. The manipulation leads to heap-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is e8a6286542924e628e02749c4f5ac4f91fdae71b. It is recommended to apply a patch to fix this issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
          "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
          "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-3159"
        },
        {
          "category": "external",
          "summary": "https://github.com/assimp/assimp/issues/6024",
          "url": "https://github.com/assimp/assimp/issues/6024"
        },
        {
          "category": "external",
          "summary": "https://github.com/assimp/assimp/issues/6024#issue-2877382033",
          "url": "https://github.com/assimp/assimp/issues/6024#issue-2877382033"
        },
        {
          "category": "external",
          "summary": "https://github.com/assimp/assimp/pull/6051",
          "url": "https://github.com/assimp/assimp/pull/6051"
        },
        {
          "category": "external",
          "summary": "https://github.com/tellypresence/assimp/commit/e8a6286542924e628e02749c4f5ac4f91fdae71b",
          "url": "https://github.com/tellypresence/assimp/commit/e8a6286542924e628e02749c4f5ac4f91fdae71b"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.303105",
          "url": "https://vuldb.com/?ctiid.303105"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.303105",
          "url": "https://vuldb.com/?id.303105"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.542247",
          "url": "https://vuldb.com/?submit.542247"
        }
      ],
      "release_date": "2025-04-03T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-13T11:31:57.142656Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515",
          "product_ids": [
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2025-3158",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. Affected by this issue is the function Assimp::LWO::AnimResolver::UpdateAnimRangeSetup of the file code/AssetLib/LWO/LWOAnimation.cpp of the component LWO File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
          "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
          "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
          "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-3158"
        },
        {
          "category": "external",
          "summary": "https://github.com/assimp/assimp/issues/6023",
          "url": "https://github.com/assimp/assimp/issues/6023"
        },
        {
          "category": "external",
          "summary": "https://github.com/assimp/assimp/issues/6023#issue-2877381000",
          "url": "https://github.com/assimp/assimp/issues/6023#issue-2877381000"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?ctiid.303104",
          "url": "https://vuldb.com/?ctiid.303104"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?id.303104",
          "url": "https://vuldb.com/?id.303104"
        },
        {
          "category": "external",
          "summary": "https://vuldb.com/?submit.542246",
          "url": "https://vuldb.com/?submit.542246"
        }
      ],
      "release_date": "2025-04-03T14:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-11-13T11:31:57.142656Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515",
          "product_ids": [
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1763033515"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.i686",
            "AlmaLinux-9.2:qt5-qt3d-devel-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-examples-0:5.15.3-1.el9.tuxcare.els2.x86_64",
            "AlmaLinux-9.2:qt5-qt3d-tests-0:5.15.3-1.el9.tuxcare.els2.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    }
  ]
}