| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
|
|
|
|
| |
Avoid parsing over the buffer limit, or interpreting non-hex as hex.
This still leaves parsing of lines longer than 300 chars unreliable.
Based on Qt5 patch for CVE-2020-17507.
Signed-off-by: Slávek Banko <slavek.banko@axis.cz>
(cherry picked from commit 9d7d238e9efc673a0dbda1140e2eaa740fe00d6b)
|
|
|
|
|
| |
Signed-off-by: Michele Calgaro <michele.calgaro@yahoo.it>
(cherry picked from commit 961eb3f6e276b4a3609328a3076ef790026e9c03)
|
|
|
|
|
|
|
|
|
|
|
| |
The ppm format specifies that the maximum color value field must be
less than 65536. The handler did not enforce this, leading to
potentional overflow when the value was used in 16 bits context.
Based on Qt5 patch for CVE-2018-19872.
Signed-off-by: Slávek Banko <slavek.banko@axis.cz>
(cherry picked from commit b08a6d71ba872e67b75a822fcd44670126975818)
|
|
|
|
|
|
|
|
|
|
| |
Make the decoder fail early to avoid spending time and memory on
attempting to decode a corrupt image file.
Based on Qt5 patch for CVE-2018-19873.
Signed-off-by: Slávek Banko <slavek.banko@axis.cz>
(cherry picked from commit a00e43bd1ce54de39f807ae5acbcaa52b15be844)
|
|
|
|
|
| |
[taken from RedHat Qt3 patches]
(cherry picked from commit b3037160f25730efca66966559779559a4946bf3)
|
|
|
|
| |
This resolves Bug 2033
|
|
|
|
| |
This breaks the ABI
|
| |
|
| |
|
| |
|
|
|