Threat Encyclopedia

RHSA-2021:2328-Security Advisory

Description

The vulnerabilities in the following products could cause the system to become vulnerable to malicious security attack: qt5-qtimageformats

Analysis

The Qt Image Formats in an add-on module for the core Qt Gui library that provides support for additional image formats including MNG, TGA, TIFF, WBMP, and WebP. Security Fix(es): libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

Affected Products

qt5-qtimageformats