An issue has been fixed in Qt versions 5.14.1 and 5.12.7 where QLibrary attempts to load plugins relative to the working directory, allowing attackers to execute arbitrary code via crafted files. Reference: https://bugreports.qt.io/browse/QTBUG-81272
Created qt tracking bugs for this issue: Affects: fedora-all [bug 1993133] Created qt3 tracking bugs for this issue: Affects: fedora-all [bug 1993134] Created qt5 tracking bugs for this issue: Affects: fedora-all [bug 1993135]
Upstream commit: https://codereview.qt-project.org/gitweb?p=qt/qtbase.git;a=commitdiff;h=e6f1fde24f77f63fb16b2df239f82a89d2bf05dd
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-24741