Name | CVE-2021-28025 |
Description | Integer Overflow vulnerability in qsvghandler.cpp in Qt qtsvg versions 5.15.1, 6.0.0, 6.0.2, and 6.2, allows local attackers to cause a denial of service (DoS). |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
qt6-svg (PTS) | bookworm | 6.4.2-2 | fixed |
| sid, trixie | 6.7.2-6 | fixed |
qtsvg-opensource-src (PTS) | bullseye | 5.15.2-3 | vulnerable |
| bookworm | 5.15.8-3 | fixed |
| sid, trixie | 5.15.15-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
- qt6-svg <not-affected> (Fixed before initial upload to the archive)
[bullseye] - qtsvg-opensource-src <no-dsa> (Minor issue)
[buster] - qtsvg-opensource-src <no-dsa> (Minor issue)
[buster] - qt4-x11 <no-dsa> (Minor issue)
https://bugreports.qt.io/browse/QTBUG-91507
https://code.qt.io/cgit/qt/qtsvg.git/commit/?id=7bbf88403fd2d1fe79fab7c8e469f8aeafeb7372 (v5.15.4-lts-lgpl)
Potentially to be considered a duplicte of CVE-2021-3481, ongoing clarification
with the two involved CNAs.