A stack overflow (stack exhaustion) flaw was found in the way Qt parsed XML input with several nested opening tags. An application using Qt's QXmlSimpleReader to parse specially crafted XML input could crash.
External References: http://seclists.org/oss-sec/2016/q4/745
Created mingw-qt tracking bugs for this issue: Affects: epel-7 [bug 1409604] Affects: fedora-all [bug 1409601] Created mingw-qt5-qtbase tracking bugs for this issue: Affects: fedora-all [bug 1409599] Created qt tracking bugs for this issue: Affects: fedora-all [bug 1409602] Created qt3 tracking bugs for this issue: Affects: fedora-all [bug 1409603] Created qt5-qtbase tracking bugs for this issue: Affects: epel-all [bug 1409598] Affects: fedora-all [bug 1409600]
Statement: Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
qt3-3.3.8b-74.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.