9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
54.7%
Debian LTS Advisory DLA-3805-1 [email protected]
https://www.debian.org/lts/security/ Thorsten Alteholz
May 01, 2024 https://wiki.debian.org/LTS
Package : qtbase-opensource-src
Version : 5.11.3+dfsg1-1+deb10u6
CVE ID : CVE-2023-24607 CVE-2023-32762 CVE-2023-32763
CVE-2023-33285 CVE-2023-37369 CVE-2023-38197
CVE-2023-51714
Several issues have been found in qtbase-opensource-src, a collection of
several Qt modules/libraries.
The issues are related to buffer overflows, infinite loops or application
crashs due to processing of crafted input files.
For Debian 10 buster, these problems have been fixed in version
5.11.3+dfsg1-1+deb10u6.
We recommend that you upgrade your qtbase-opensource-src packages.
For the detailed security status of qtbase-opensource-src please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/qtbase-opensource-src
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.6 High
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
54.7%