git: af1809be087c - main - security/vuxml: Qt5 vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 21 Feb 2022 00:26:56 UTC
The branch main has been updated by adridg: URL: https://cgit.FreeBSD.org/ports/commit/?id=af1809be087ca0660f2018d10e64685e9c25e490 commit af1809be087ca0660f2018d10e64685e9c25e490 Author: Adriaan de Groot <adridg@FreeBSD.org> AuthorDate: 2022-02-21 00:25:59 +0000 Commit: Adriaan de Groot <adridg@FreeBSD.org> CommitDate: 2022-02-21 00:25:59 +0000 security/vuxml: Qt5 vulnerability --- security/vuxml/vuln-2022.xml | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) diff --git a/security/vuxml/vuln-2022.xml b/security/vuxml/vuln-2022.xml index 69bdc14a7672..68050ed2428b 100644 --- a/security/vuxml/vuln-2022.xml +++ b/security/vuxml/vuln-2022.xml @@ -1,3 +1,31 @@ + <vuln vid="43ae57f6-92ab-11ec-81b4-2cf05d620ecc"> + <topic>Qt5 -- QProcess unexpected search path</topic> + <affects> + <package> + <name>qt5-core</name> + <range><lt>5.15.2p263_1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Qt Company reports:</p> + <blockquote cite="https://lists.qt-project.org/pipermail/announce/2022-February/000333.html"> + <p>Recently, the Qt Project's security team was made aware of an issue regarding QProcess and determined it to be a security issue on Unix-based platforms only. We do not believe this to be a considerable risk for applications as the likelihood of it being triggered is minimal. +</p> +<p>Specifically, the problem is around using QProcess to start an application without having an absolute path, and as a result, it depends on it finding it in the PATH environment variable. As a result, it may be possible for an attacker to place their copy of the executable in question inside the working/current directory for the QProcess and have it invoked that instead.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2022-25255</cvename> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25255</url> + </references> + <dates> + <discovery>2022-02-17</discovery> + <entry>2022-02-21</entry> + </dates> + </vuln> + <vuln vid="4d763c65-9246-11ec-9aa3-4ccc6adda413"> <topic>libmysoft -- Heap-based buffer overflow vulnerability</topic> <affects>