First published: Mon Jan 02 2017(Updated: )
A stack overflow (stack exhaustion) flaw was found in the way Qt parsed XML input with several nested opening tags. An application using Qt's QXmlSimpleReader to parse specially crafted XML input could crash.
Affected Software | Affected Version | How to fix |
---|---|---|
Qt QXmlSimpleReader |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1409597 is considered high due to the potential for application crashes caused by specially crafted XML input.
To fix REDHAT-BUG-1409597, update your Qt QXmlSimpleReader to a patched version that addresses the stack overflow issue.
All versions of Qt QXmlSimpleReader that do not include patches for stack overflow vulnerabilities are affected by REDHAT-BUG-1409597.
Any application utilizing the Qt QXmlSimpleReader to parse XML input is impacted by REDHAT-BUG-1409597.
A practical workaround for REDHAT-BUG-1409597 is to avoid using nested opening tags in XML inputs processed by Qt's QXmlSimpleReader until a patch is available.