Skip to content

Commit

Permalink
security/vuxml: Document QtNetwork buffer overflow
Browse files Browse the repository at this point in the history
An issue was discovered in the HTTP2 implementation in Qt before 5.15.17,
6.x before 6.2.11, 6.3.x through 6.5.x before 6.5.4, and 6.6.x before
6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer
overflow check.

Base Score:	9.8 CRITICAL
Vector:		CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Loading branch information
BSDKaffee committed Jan 7, 2024
1 parent aa94a0d commit 06b2033
Showing 1 changed file with 33 additions and 0 deletions.
33 changes: 33 additions & 0 deletions security/vuxml/vuln/2024.xml
@@ -1,3 +1,36 @@
<vuln vid="e2f981f1-ad9e-11ee-8b55-4ccc6adda413">
<topic>QtNetwork -- potential buffer overflow</topic>
<affects>
<package>
<name>qt5-network</name>
<range><lt>5.15.12p148_1</lt></range>
</package>
<package>
<name>qt6-base</name>
<range><lt>6.6.1_2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Andy Shaw reports:</p>
<blockquote cite="https://www.qt.io/blog/security-advisory-potential-integer-overflow-in-qts-http2-implementation">
<p>A potential integer overflow has been discovered in Qt's HTTP2
implementation. If the HTTP2 implementation receives more then 4GiB
in total headers, or more than 2GiB for any given header pair, then
the internal buffers may overflow.</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2023-51714</cvename>
<url>https://www.qt.io/blog/security-advisory-potential-integer-overflow-in-qts-http2-implementation</url>
</references>
<dates>
<discovery>2023-12-14</discovery>
<entry>2024-01-07</entry>
</dates>
</vuln>

<vuln vid="1f0d0024-ac9c-11ee-8e91-1c697a013f4b">
<topic>mantis -- multiple vulnerabilities</topic>
<affects>
Expand Down

0 comments on commit 06b2033

Please sign in to comment.