Hi,

Thank you for bringing this to oss-security!  As I also communicated
privately, as a moderator I had to repair this message's content prior
to approving it because the text/plain section was garbled to the point
of being unreadable.  This is why the delay (message received April 22,
approved April 24).  However, I did not edit any of the content beyond
making it look right in text/plain, so I post this follow-up instead:

On Tue, Apr 22, 2025 at 11:36:46AM +0000, 田世林 wrote:
> A heap buffer overflow vulnerability exists in `QTextMarkdownImporter`.
> When parsing the front matter of a Markdown file, the code assumes that
> more characters (e.g., a newline) will be present in the input after
> finding the closing marker `---`. However, if the input stream ends with
> the `----` delimiter and lacks a trailing newline, calling
> `QStringView::sliced()` will attempt to access characters beyond the end
> of the string, causing the program to crash.

This reads like it's an out-of-bounds read, _not_ a buffer overflow - or
if it somehow _is_ a buffer overflow, then the description is lacking.

Can we please try and label vulnerabilities correctly?  There appears to
be a growing trend towards calling OOB reads "buffer overflows".  Just
this month on oss-security, we saw this for a giflib bug and then for
two libxml2 bugs, and now QTextMarkdownImporter is like the fourth with
this same kind of mis-labeling in here this month.

Thanks, and sorry for maybe sounding negative - I don't mean to be.

Alexander

Reply via email to