Details
-
Bug
-
Resolution: Done
-
P1: Critical
-
4.8.0
-
None
-
c01eaa438200edc9a3bbcd8ae1e8ded058bea268
Description
This is more a problem on the server side, but still we should be aware of this. It looks like one could create collisions with our qHash(QString) which would eat up CPU, see http://events.ccc.de/congress/2011/Fahrplan/events/4680.en.html
Attachments
Issue Links
- is required for
-
QTBUG-25005 Critical issues for Qt5 Beta 1
- Closed
For Gerrit Dashboard: QTBUG-23529 | ||||||
---|---|---|---|---|---|---|
# | Subject | Branch | Project | Status | CR | V |
20410,12 | QHash security fix (1/2): add global QHash seed | api_changes | qt/qtbase | Status: MERGED | +2 | 0 |
21323,8 | QHash security fix (1.5/2): qHash two arguments overload support | api_changes | qt/qtbase | Status: MERGED | +2 | 0 |
22422,2 | QHash security fix (2/2): enable QHash random seed | api_changes | qt/qtbase | Status: MERGED | +2 | 0 |