First published: Thu Jul 04 2024(Updated: )
An issue was discovered in HTTP2 in Qt before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3. Code to make security-relevant decisions about an established connection may execute too early, because the encrypted() signal has not yet been emitted and processed..
Affected Software | Affected Version | How to fix |
---|---|---|
Trolltech Qt | <5.15.18 | |
Trolltech Qt | <6.2.13 | |
Trolltech Qt | >=6.3.0<6.5.7 | |
Trolltech Qt | >=6.6.0<6.7.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2295867 is considered high due to its impact on security decisions in established connections.
To fix REDHAT-BUG-2295867, update your Qt version to 5.15.18 or later, or 6.2.13 or later, and ensure that you are not using any affected versions.
Affected versions of Qt include all versions before 5.15.18, 6.x before 6.2.13, 6.3.x through 6.5.x before 6.5.7, and 6.6.x through 6.7.x before 6.7.3.
REDHAT-BUG-2295867 is a security vulnerability related to the HTTP2 protocol in Qt.
There is no official workaround for REDHAT-BUG-2295867; the best course of action is to upgrade to the patched versions.