Name | CVE-2020-0570 |
Description | Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
qtbase-opensource-src (PTS) | jessie, jessie (lts) | 5.3.2+dfsg-4+deb8u7 | fixed |
| stretch (security) | 5.7.1+dfsg-3+deb9u3 | fixed |
| stretch (lts), stretch | 5.7.1+dfsg-3+deb9u5 | fixed |
| buster, buster (lts) | 5.11.3+dfsg1-1+deb10u7 | fixed |
| buster (security) | 5.11.3+dfsg1-1+deb10u6 | fixed |
| bullseye | 5.15.2+dfsg-9+deb11u1 | fixed |
| bookworm | 5.15.8+dfsg-11+deb12u2 | fixed |
| sid, trixie | 5.15.15+dfsg-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - qtbase-opensource-src <not-affected> (Only affects 5.12.0 through 5.14.0)
[jessie] - qtbase-opensource-src <not-affected> (Only affects 5.12.0 through 5.14.0)
https://bugreports.qt.io/browse/QTBUG-81272
Patch: https://code.qt.io/cgit/qt/qtbase.git/commit/?id=e6f1fde24f77f63fb16b2df239f82a89d2bf05dd
https://lists.qt-project.org/pipermail/development/2020-January/038534.html