First published: Sun Mar 24 2024(Updated: )
In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | >=6.5.4<=6.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-30161 is considered medium due to the potential for exploitation via a dangling pointer.
To fix CVE-2024-30161, upgrade Qt to version 6.5.6 or later, which addresses the vulnerability.
Qt versions 6.5.4, 6.5.5, and 6.6.2 are affected by CVE-2024-30161.
CVE-2024-30161 can lead to unexpected behavior and potential data exposure in applications using Qt for WebAssembly.
There are no known workarounds for CVE-2024-30161, so upgrading to a patched version is the recommended action.