In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.) — CVE-2024-30161
Date
Source
MSRC
MSRC
Vendor
Microsoft
Microsoft
Threat
medium
medium
CVSS
6.5
6.5
Summary
Advisory CVE-2024-30161. In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier… Vendor: Microsoft. Source: MSRC. Threat: medium. CVSS 6.5. See the official…
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.