CVE-2025-5991

NameCVE-2025-5991
DescriptionThere is a "Use After Free" vulnerability in Qt's QHttp2ProtocolHandler in the QtNetwork module. This only affects HTTP/2 handling, HTTP handling is not affected by this at all. This happens due to a race condition between how QHttp2Stream uploads the body of a POST request and the simultaneous handling of HTTP error responses. This issue only affects Qt 6.9.0 and has been fixed for Qt 6.9.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
qt6-base (PTS)bookworm6.4.2+dfsg-10vulnerable
trixie, sid6.8.2+dfsg-6vulnerable
qtbase-opensource-src (PTS)bullseye5.15.2+dfsg-9+deb11u1vulnerable
bookworm5.15.8+dfsg-11+deb12u3vulnerable
trixie, sid5.15.15+dfsg-5vulnerable
qtbase-opensource-src-gles (PTS)bullseye5.15.2+dfsg-4vulnerable
bookworm5.15.8+dfsg-3vulnerable
trixie, sid5.15.15+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
qt6-basesource(unstable)(unfixed)
qtbase-opensource-srcsource(unstable)(unfixed)
qtbase-opensource-src-glessource(unstable)(unfixed)unimportant

Notes

[bookworm] - qt6-base <no-dsa> (Minor issue)
[bookworm] - qtbase-opensource-src <no-dsa> (Minor issue)
https://codereview.qt-project.org/c/qt/qtbase/+/643777
The -gles package doesn't build the HTTP2 code, only included in the source package

Search for package or bug name: Reporting problems