Summary: | <dev-qt/qtcore-5.15.10-r1, <dev-qt/qtbase-6.5.2: potential buffer overflow issue in QXmlStreamReader | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Andreas Sturmlechner <asturm> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | ionen, qt |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa+] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 911791 | ||
Bug Blocks: |
Description
Andreas Sturmlechner
![]() The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=d67ecfdb7d124b05a2af89478dd6eff099eabd0e commit d67ecfdb7d124b05a2af89478dd6eff099eabd0e Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2023-08-05 22:38:13 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2023-08-05 23:00:08 +0000 dev-qt/qtcore: Bump to QT5_KDEPATCHSET_REV=2 Ahmad Samir (2): QXmlStreamReader: change fastScanName() to take a Value* QXmlStreamReader: make fastScanName() indicate parsing status to callers Axel Spoerl (1): QXmlStreamReader: Raise error on unexpected tokens Friedemann Kleint (1): Fix typo in QXmlStreamReader error message Marc Mutz (2): QLogging: DRY isFatal(QtMsgType) Make sure we don't count down past 0 QT_FATAL_CRITICALS Volker Krause (1): Fix Croatia's currency See also: https://www.qt.io/blog/security-advisory-qxmlstreamreader https://www.qt.io/blog/security-advisory-qxmlstreamreader-1 Bug: https://bugs.gentoo.org/911790 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> dev-qt/qtcore/Manifest | 1 + dev-qt/qtcore/qtcore-5.15.10-r1.ebuild | 120 +++++++++++++++++++++++++++++++++ 2 files changed, 121 insertions(+) wrt qtbase, our qtbase-6.5.2 was added from the start with: PATCHES=( "${FILESDIR}/${PN}-6.5.2-CVE-2023-38197.patch" ) Excellent. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=c087cd6aecbcbcd9ae58a1ee9a38f28118a39503 commit c087cd6aecbcbcd9ae58a1ee9a38f28118a39503 Author: Andreas Sturmlechner <asturm@gentoo.org> AuthorDate: 2023-08-16 15:27:07 +0000 Commit: Andreas Sturmlechner <asturm@gentoo.org> CommitDate: 2023-08-16 16:03:32 +0000 dev-qt/qtcore: cleanup vulnerable 5.15.10 Bug: https://bugs.gentoo.org/911790 Signed-off-by: Andreas Sturmlechner <asturm@gentoo.org> dev-qt/qtcore/Manifest | 1 - dev-qt/qtcore/qtcore-5.15.10.ebuild | 119 ------------------------------------ 2 files changed, 120 deletions(-) status ? (In reply to genBTC from comment #5) > status ? There's nothing left to do here beside letting the security team decide if want to do a glsa for this (been fixed for a few months, and vulnerable versions are removed). Or is the glsa what you're asking about? The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/data/glsa.git/commit/?id=bd365c3169a9b2d7ee06673e8f4353dbcfd8fa7d commit bd365c3169a9b2d7ee06673e8f4353dbcfd8fa7d Author: GLSAMaker <glsamaker@gentoo.org> AuthorDate: 2025-01-23 07:21:01 +0000 Commit: Hans de Graaff <graaff@gentoo.org> CommitDate: 2025-01-23 07:21:29 +0000 [ GLSA 202501-08 ] Qt: Buffer Overflow Bug: https://bugs.gentoo.org/911790 Signed-off-by: GLSAMaker <glsamaker@gentoo.org> Signed-off-by: Hans de Graaff <graaff@gentoo.org> glsa-202501-08.xml | 48 ++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 48 insertions(+) |