From this webpage screenshot, we can extract the following key information about the vulnerability: 1. Issue Description: - Issue Title: - Description: 2. Reproduction Steps: - Execute the following command via command line: 3. Current Behavior: - On version 4.5.0 (v4.5.0rc0-973-gb42dc76c89af), using GCC 13.2.0, 64-bit, Qt 6.4.2, libpcap 1.10.4, libssl 1.3, libcrypto 1.10.3, libnghttp2 1.59.0, liblz4 1.9.4, libzstandard 1.5.5, libsnappy 0.4.8, libxml2 4, libsmi 0.4.8, dark display mode, no HiDPI, using Wayland, QPA plugin “wayland”, LC_TYPE=en_US.UTF-8, binary plugin support enabled. - On Linux 6.8.0-48-generic, Intel(R) Core(TM) Ultra 7 155H (SSE4.2), 63750 MB physical memory, GCC 13.2.0, Qt 6.4.2, libpcap 1.10.4 (with TPACKET_V3), libssl 1.3, libcrypto 1.10.3, libnghttp2 1.59.0, liblz4 1.9.4, libzstandard 1.5.5, libsnappy 0.4.8, dark display mode, no HiDPI, using Wayland, QPA plugin “wayland”, LC_TYPE=en_US.UTF-8, binary plugin support enabled. 4. Expected Behavior: - The expected behavior mentioned in the issue description is not detailed. 5. Related Merge Requests: - Three related merge requests: - - - 6. Activity: - Issue Discussion: - One user attempted to reproduce the issue on macOS using and command line options, but was unsuccessful. - Another user confirmed that the issue does not occur on Ubuntu 24.04, but crashes still happen when using standard builds or official executable files. This information helps us understand the context, reproduction steps, current behavior, expected behavior, and related merge requests, enabling better comprehension of the issue and facilitating its resolution.