First published: Thu Jul 04 2024(Updated: )
An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | <5.15.18 | |
Trolltech Qt | >=6.0.0<6.2.13 | |
Trolltech Qt | >=6.3.0<6.5.7 | |
Trolltech Qt | >=6.6.0<6.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-39936 is considered medium due to the potential for security-relevant decisions to be made prematurely.
To fix CVE-2024-39936, upgrade Qt to version 5.15.18 or later, or update to version 6.7.3 or newer.
CVE-2024-39936 affects Qt versions before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3.
Applications using affected versions of the Qt framework that rely on HTTP2 functionality are impacted by CVE-2024-39936.
Yes, organizations should address CVE-2024-39936 promptly to mitigate potential security risks associated with the vulnerability.