Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-30161

Опубликовано: 24 мар. 2024
Источник: debian
EPSS Низкий

Описание

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)

Пакеты

ПакетСтатусВерсия исправленияРелизТип
qt6-basenot-affectedpackage
qtbase-opensource-srcnot-affectedpackage
qtbase-opensource-src-glesnot-affectedpackage

Примечания

  • https://codereview.qt-project.org/c/qt/qtbase/+/544314

  • https://codereview.qt-project.org/gitweb?p=qt%2Fqtbase.git;a=commit;h=a5b00cefef12999e9a213943855abe6bc0ab5365

EPSS

Процентиль: 22%
0.00071
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 1 года назад

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)

CVSS3: 6.5
redhat
около 1 года назад

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)

CVSS3: 6.5
nvd
около 1 года назад

In Qt 6.5.4, 6.5.5, and 6.6.2, QNetworkReply header data might be accessed via a dangling pointer in Qt for WebAssembly (wasm). (Earlier and later versions are unaffected.)

CVSS3: 6.5
msrc
5 месяцев назад

Описание отсутствует

suse-cvrf
около 1 года назад

Security update for qt6-base

EPSS

Процентиль: 22%
0.00071
Низкий