summaryrefslogtreecommitdiffstats
path: root/src/gui/kernel/qhighdpiscaling.cpp
diff options
context:
space:
mode:
authorThiago Macieira <thiago.macieira@intel.com>2019-08-08 19:12:32 -0700
committerThiago Macieira <thiago.macieira@intel.com>2019-08-10 17:09:18 -0700
commita08ac1986d39b4d4614f654b3408c7b846c835c9 (patch)
tree32a9a051af5c215bab92c4006fde05452dfd23aa /src/gui/kernel/qhighdpiscaling.cpp
parentaca43d29f8a1c90d14069ac602cf0ba7beaba300 (diff)
Fix integer overflow in QCryptographicHash's SHA-3 support
Because 256 MB * 8 = 2 Gbit, but length*8 is a signed integer overflow, hence UB. Can't really autotest this. Not all systems where we're going to test can allocate 256 MB of RAM. [ChangeLog][QtCore][QCryptographicHash] Fixed a bug that caused the SHA-3 and Keccak algorithms to crash if passed 256 MB of data or more. Fixes: QTBUG-77362 Change-Id: Iec9c051acd73484c8d94fffd15b91f4b1450f5d7 Reviewed-by: Marc Mutz <marc.mutz@kdab.com>
Diffstat (limited to 'src/gui/kernel/qhighdpiscaling.cpp')
0 files changed, 0 insertions, 0 deletions