QLibrary on certain x86 machines, would search for certain libraries and plugins relative to current working directory of the application, which allows an attacker that can place files in the file system and influence the working directory of Qt-based applications to load and execute malicious code. Upstream Patch: https://code.qt.io/cgit/qt/qtbase.git/commit/?id=e6f1fde24f77f63fb16b2df239f82a89d2bf05dd
Created qt tracking bugs for this issue: Affects: fedora-all [bug 1800605]
Created qt5 tracking bugs for this issue: Affects: fedora-all [bug 1814162]
Created qt5-qtbase tracking bugs for this issue: Affects: epel-6 [bug 1814738]
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:4025 https://access.redhat.com/errata/RHSA-2020:4025
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-0570
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4690 https://access.redhat.com/errata/RHSA-2020:4690