CVE-2024-30161Use After Free in QT

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 76.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages6 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-5gxc-5wfv-r5f9: In Qt before 62024-03-24
OSV
CVE-2024-30161: In Qt 62024-03-24

📋Vendor Advisories

3
Red Hat
qt6: wasm component may access QNetworkReply header improperly2024-03-24
Microsoft
In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)2024-03-12
Debian
CVE-2024-30161: qt6-base - In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a...2024
CVE-2024-30161 — Use After Free in QT | cvebase