Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Get Qt Extensions
  • Unsolved
Collapse
Brand Logo
  1. Home
  2. Qt Development
  3. Qt WebKit
  4. Qt(4.8.7) vulnerabilities

Qt(4.8.7) vulnerabilities

Scheduled Pinned Locked Moved Qt WebKit
11 Posts 4 Posters 1.6k Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Axel SpoerlA Offline
    Axel SpoerlA Offline
    Axel Spoerl
    Moderators
    wrote on last edited by
    #2

    The CVEs are pretty clear about what happens under which circumstances.
    Forgive my openness, but that sounds like asking for instructions to hack something using a long-outdated Qt version.

    Software Engineer
    The Qt Company, Oslo

    A 1 Reply Last reply
    1
    • Axel SpoerlA Axel Spoerl

      The CVEs are pretty clear about what happens under which circumstances.
      Forgive my openness, but that sounds like asking for instructions to hack something using a long-outdated Qt version.

      A Offline
      A Offline
      A Akshatha
      wrote on last edited by
      #3

      @Axel-Spoerl said in Qt(4.8.7) vulnerabilities:

      The CVEs are pretty clear about what happens under which circumstances.
      We have fixed the vulnerabilities in Qt 4.8.7 . In order to check whether the vulnerability is fixed, we have to know how to reproduce the issue.
      Forgive my openness, but that sounds like asking for instructions to hack something using a long-outdated Qt version.
      I am sorry if you felt like that. But the above mentioned is not the intention.

      SGaistS Axel SpoerlA 2 Replies Last reply
      0
      • A A Akshatha

        @Axel-Spoerl said in Qt(4.8.7) vulnerabilities:

        The CVEs are pretty clear about what happens under which circumstances.
        We have fixed the vulnerabilities in Qt 4.8.7 . In order to check whether the vulnerability is fixed, we have to know how to reproduce the issue.
        Forgive my openness, but that sounds like asking for instructions to hack something using a long-outdated Qt version.
        I am sorry if you felt like that. But the above mentioned is not the intention.

        SGaistS Offline
        SGaistS Offline
        SGaist
        Lifetime Qt Champion
        wrote on last edited by
        #4

        @A-Akshatha can you explain exactly what is your goal then ?

        Interested in AI ? www.idiap.ch
        Please read the Qt Code of Conduct - https://forum.qt.io/topic/113070/qt-code-of-conduct

        1 Reply Last reply
        1
        • A A Akshatha

          @Axel-Spoerl said in Qt(4.8.7) vulnerabilities:

          The CVEs are pretty clear about what happens under which circumstances.
          We have fixed the vulnerabilities in Qt 4.8.7 . In order to check whether the vulnerability is fixed, we have to know how to reproduce the issue.
          Forgive my openness, but that sounds like asking for instructions to hack something using a long-outdated Qt version.
          I am sorry if you felt like that. But the above mentioned is not the intention.

          Axel SpoerlA Offline
          Axel SpoerlA Offline
          Axel Spoerl
          Moderators
          wrote on last edited by
          #5

          We have fixed the vulnerabilities in Qt 4.8.7 . In order to check whether the vulnerability is fixed, we have to know how to reproduce the issue.

          CVE-2018-19873 is all about a bitmap larger than 16384 by 16384 bytes causing a buffer overflow.

          • you have fixed it, you say.
          • at the same time, you need help to reproduce a buffer overflow?

          Sorry again, but I have hard times believing that. How about a large bitmap and a sanitizer?

          Software Engineer
          The Qt Company, Oslo

          1 Reply Last reply
          0
          • A Offline
            A Offline
            A Akshatha
            wrote on last edited by
            #6

            We have obtained the code for fixing the vulnerability from the site: https://codereview.qt-project.org/#/c/238749/
            But in order to confirm and ensure whether this is the fix of the vulnerability : CVE-2018-19873,we wanted to know how it is reproduced. i.e., to check both the cases: before and after fix.
            Hope now the intention behind asking the query is clear.

            1 Reply Last reply
            0
            • Christian EhrlicherC Offline
              Christian EhrlicherC Offline
              Christian Ehrlicher
              Lifetime Qt Champion
              wrote on last edited by
              #7

              So basically you trust the rest of the code is fine but not those patches? Strange logic...

              Qt Online Installer direct download: https://download.qt.io/official_releases/online_installers/
              Visit the Qt Academy at https://academy.qt.io/catalog

              1 Reply Last reply
              1
              • A Offline
                A Offline
                A Akshatha
                wrote on last edited by
                #8

                We are doing this as part of a test case requested by our client. In that test case we have to implement before and after fix of the vulnerability CVE-2018-19873 and have to submit the proof to the client.
                Hope it is clear.

                1 Reply Last reply
                0
                • Axel SpoerlA Offline
                  Axel SpoerlA Offline
                  Axel Spoerl
                  Moderators
                  wrote on last edited by
                  #9

                  Use a large pixmap and a sanitizer for that proof.
                  For more advice, contact your / your client's account manager.
                  This forum is not for commercial support.

                  Software Engineer
                  The Qt Company, Oslo

                  1 Reply Last reply
                  1
                  • A Offline
                    A Offline
                    A Akshatha
                    wrote on last edited by
                    #10

                    We used large bitmap size say 17000x17000 but we were not able to reproduce the vulnerability.
                    How is this vulnerability is shown?

                    1 Reply Last reply
                    0
                    • Axel SpoerlA Offline
                      Axel SpoerlA Offline
                      Axel Spoerl
                      Moderators
                      wrote on last edited by
                      #11

                      As said before, contact your account manager.
                      I will lock this topic now.

                      Software Engineer
                      The Qt Company, Oslo

                      1 Reply Last reply
                      0
                      • Axel SpoerlA Axel Spoerl locked this topic on
                      • A A Akshatha marked this topic as a regular topic on

                      • Login

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent
                      • Tags
                      • Popular
                      • Users
                      • Groups
                      • Search
                      • Get Qt Extensions
                      • Unsolved