Back to list

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.) — CVE-2024-30161

Date
Source
MSRC
Vendor
Microsoft
Threat
medium
CVSS
6.5

Summary

Advisory CVE-2024-30161. In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier… Vendor: Microsoft. Source: MSRC. Threat: medium. CVSS 6.5. See the official…

What to do

General, cautious steps (verify details in the official source):

  • Review exposure and plan remediation based on risk and environment.
  • Identify affected product versions in your inventory and verify whether you are impacted.
  • Apply vendor patches/updates or recommended mitigations as soon as available.
  • Read the official advisory for exact affected versions and remediation steps.

Official advisory

Read the official source

Related advisories