Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250424190626.4qoptkgyk7tj6c74@jwilk.net>
Date: Thu, 24 Apr 2025 21:06:26 +0200
From: Jakub Wilk <jwilk@...lk.net>
To: oss-security@...ts.openwall.com
Subject: Re: CVE-2025-3512: Qt Base QTextMarkdownImporter
 Front Matter Buffer Overflow

* Solar Designer <solar@...nwall.com>, 2025-04-24 20:32:
>There appears to be a growing trend towards calling OOB reads "buffer 
>overflows".

Part of the problem may be that AddressSanitizer uses this unforuntate 
terminology; you get something like this:

     ==7802==ERROR: AddressSanitizer: stack-buffer-overflow on address 0xf5f00021 at pc 0xf79c113e bp 0xfff496e8 sp 0xfff492c4
     READ of size 2 at 0xf5f00021 thread T0

-- 
Jakub Wilk

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.