← Back to team overview

ubuntu-sdk-bugs team mailing list archive

[Bug 1259577] Re: Security: XML Entity Expansion Denial of Service

 

This bug was fixed in the package qtbase-opensource-src -
5.0.2+dfsg1-7ubuntu13

---------------
qtbase-opensource-src (5.0.2+dfsg1-7ubuntu13) trusty; urgency=low

  * SECURITY UPDATE: [XML Entity Expansion Denial of Service] (LP: #1259577).
    - add limit in src/xml/sax/qxml.cpp
    - http://lists.qt-project.org/pipermail/announce/2013-December/000036.html
    - CVE-2013-4549
 -- Jonathan Riddell <jriddell@xxxxxxxxxx>   Tue, 10 Dec 2013 15:08:17 +0000

** Changed in: qtbase-opensource-src (Ubuntu Trusty)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
SDK bug tracking, which is subscribed to qtbase-opensource-src in
Ubuntu.
https://bugs.launchpad.net/bugs/1259577

Title:
  Security: XML Entity Expansion Denial of Service

Status in “qt4-x11” package in Ubuntu:
  New
Status in “qtbase-opensource-src” package in Ubuntu:
  Fix Released
Status in “qt4-x11” source package in Precise:
  New
Status in “qt4-x11” source package in Quantal:
  New
Status in “qt4-x11” source package in Raring:
  New
Status in “qtbase-opensource-src” source package in Raring:
  New
Status in “qt4-x11” source package in Saucy:
  New
Status in “qtbase-opensource-src” source package in Saucy:
  New
Status in “qt4-x11” source package in Trusty:
  New
Status in “qtbase-opensource-src” source package in Trusty:
  Fix Released

Bug description:
  http://lists.qt-
  project.org/pipermail/announce/2013-December/000036.html

  Qt Project Security Advisory
  ----------------------------

  Title:        XML Entity Expansion Denial of Service
  Risk Rating:  Low
  CVE:          CVE-2013-4549
  Platforms:    All
  Modules:      QtBase
  Versions:     All versions before 5.2
  Author:       Richard J. Moore <rich at kde.org>
  Date:         5 December 2013

  Overview
  --------

  QXmlSimpleReader in Qt versions prior to 5.2 supports expansion of internal
  entities in XML documents without placing restrictions to ensure the document
  does not cause excessive memory usage. If an application using this API
  processes untrusted data then the application may use unexpected amounts of
  memory if a malicious document is processed.

  Details
  -------

  It is possible to construct XML documents using internal entities that consume
  large amounts of memory and other resources to process, this is known as the
  'Billion Laughs' attack. Qt versions prior to 5.2 did not offer protection
  against this issue.

  Impact
  ------

  An application loading untrusted XML data may consume arbitrary amounts of
  memory and CPU when attempting to parse a maliciously constructed document.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qt4-x11/+bug/1259577/+subscriptions


References