vulnerability
FreeBSD: VID-e79cc4e2-12d7-11ef-83d8-4ccc6adda413 (CVE-2024-33861): qt6-base (core module) -- Invalid pointer in QStringConverter
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:N/I:C/A:N) | May 15, 2024 | Dec 10, 2025 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:N)
Published
May 15, 2024
Added
Dec 10, 2025
Modified
Dec 10, 2025
Description
Andy Shaw reports: QStringConverter has an invalid pointer being passed as a callback which can allow modification of the stack. Qt itself is not vulnerable to remote attack however an application using QStringDecoder either directly or indirectly can be vulnerable. This requires: the attacker be able to tell the application a specific codec to use the attacker be able to feed the application data in a specific way to cause the desired modification the attacker what in the stack will get modified, which requires knowing the build of the application (and not all builds will be vulnerable) the modification do anything in particular that is useful to the attacker, besides maybe crashing the application Qt does not automatically use any of those codecs, so this needs the application to implement something using QStringDecoder to be vulnerable.
Solution
freebsd-upgrade-package-qt6-base
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.