aboutsummaryrefslogtreecommitdiff
path: root/net/unison248
diff options
context:
space:
mode:
authorJason E. Hale <jhale@FreeBSD.org>2024-01-07 21:27:24 +0000
committerJason E. Hale <jhale@FreeBSD.org>2024-01-07 22:03:34 +0000
commit205177c8320e5b5ab241deda273f860866b62218 (patch)
treeb454f7d6a57f9c1f662737894623f1764e43a100 /net/unison248
parent06b20337d2933e72ac3c5f8f0be5b5ac2fc1694f (diff)
downloadports-205177c8320e5b5ab241deda273f860866b62218.tar.gz
ports-205177c8320e5b5ab241deda273f860866b62218.zip
net/qt5-network: Address CVE-2023-51714
A potential integer overflow has been discovered in Qt's HTTP2 implementation. If the HTTP2 implementation receives more then 4GiB in total headers, or more than 2GiB for any given header pair, then the internal buffers may overflow. Reported by: vvd via #freebsd-desktop MFH: 2024Q1 Security: e2f981f1-ad9e-11ee-8b55-4ccc6adda413
Diffstat (limited to 'net/unison248')
0 files changed, 0 insertions, 0 deletions