![]() |
|
Message-ID: <tencent_11C8C35C2CF529292F8447A8@qq.com> Date: Tue, 22 Apr 2025 11:36:46 +0000 From: "田世林" <tianshilin@...pin.org> To: "oss-security" <oss-security@...ts.openwall.com> Subject: CVE-2025-3512: Qt Base QTextMarkdownImporter Front Matter Buffer Overflow A heap buffer overflow vulnerability exists in `QTextMarkdownImporter`. When parsing the front matter of a Markdown file, the code assumes that more characters (e.g., a newline) will be present in the input after finding the closing marker `---`. However, if the input stream ends with the `----` delimiter and lacks a trailing newline, calling `QStringView::sliced()` will attempt to access characters beyond the end of the string, causing the program to crash. Causes of the vulnerability: 1. Insufficient boundary checks: The case where the delimiter appears at the end of the input was not handled correctly. 2. Overly permissive marker requirements: Allowing unexpected whitespace or other formatting errors led to issues in the parsing logic. Affected versions: 6.8.0 to 6.8.3 Unaffected versions: Versions prior to 6.6.0 Fix patch: https://codereview.qt-project.org/c/qt/qtbase/+/635546
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.