It was found that qt-qtsvg incorrectly checks for the end of input while parsing url references. A malformed url reference could cause the application to crash. References: https://codereview.qt-project.org/#/c/234142/
Created mingw-qt5-qtsvg tracking bugs for this issue: Affects: epel-7 [bug 1661464] Affects: fedora-all [bug 1661461] Created qt5-qtsvg tracking bugs for this issue: Affects: epel-6 [bug 1661463] Affects: fedora-all [bug 1661462]
Statement: This issue affects the versions of qt5-qtsvg and qt as shipped with Red Hat Enterprise Linux 7.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:2135 https://access.redhat.com/errata/RHSA-2019:2135
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-19869
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1172 https://access.redhat.com/errata/RHSA-2020:1172
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1665 https://access.redhat.com/errata/RHSA-2020:1665