Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-5455

Опубликовано: 02 июн. 2025
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.

A flaw was found in QtCore's qDecodeDataUrl() function. This vulnerability allows an application level denial of service via a malformed data URL with a missing charset value when assertions are enabled.

Отчет

Within regulated environments, a combination of the following controls acts as a significant barrier to successful exploitation of a CWE-20: Improper Input Validation or a CWE-617: Reachable Assertion vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by input validation vulnerabilities. Security testing, static analysis, and peer reviews validate input handling and identify unsafe assertions or insecure constructs, which are excluded from production to prevent system disruption or logic exposure. Process isolation ensures that processes handling potentially malicious or unvalidated inputs run in isolated environments by separating execution domains for each process. Malicious code protections such as IPS/IDS and antimalware solutions help detect and mitigate malicious payloads stemming from input validation vulnerabilities. Finally, robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks further

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8qt5Fix deferred
Red Hat Enterprise Linux 10qt6-qtbaseFixedRHSA-2025:948624.06.2025
Red Hat Enterprise Linux 9qt5-qtbaseFixedRHSA-2025:946224.06.2025
Red Hat Enterprise Linux 9.4 Extended Update Supportqt5-qtbaseFixedRHSA-2025:1184128.07.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
Дефект:
CWE-617
https://bugzilla.redhat.com/show_bug.cgi?id=2369722qt5: qt6: QtCore Assertion Failure Denial of Service

EPSS

Процентиль: 34%
0.00135
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.

nvd
5 месяцев назад

An issue was found in the private API function qDecodeDataUrl() in QtCore, which is used in QTextDocument and QNetworkReply, and, potentially, in user code. If the function was called with malformed data, for example, an URL that contained a "charset" parameter that lacked a value (such as "data:charset,"), and Qt was built with assertions enabled, then it would hit an assertion, resulting in a denial of service (abort). This impacts Qt up to 5.15.18, 6.0.0->6.5.8, 6.6.0->6.8.3 and 6.9.0. This has been fixed in 5.15.19, 6.5.9, 6.8.4 and 6.9.1.

CVSS3: 6.5
msrc
3 месяца назад

Possible denial of service when passing malformed data in a URL to qDecodeDataUrl

debian
5 месяцев назад

An issue was found in the private API function qDecodeDataUrl() in QtC ...

rocky
около 1 месяца назад

Moderate: qt6-qtbase security update

EPSS

Процентиль: 34%
0.00135
Низкий

5.3 Medium

CVSS3