{"id":"CVE-2018-19873","details":"An issue was discovered in Qt before 5.11.3. QBmpHandler has a buffer overflow via BMP data.","modified":"2026-04-10T04:09:54.530435Z","published":"2018-12-26T21:29:02.480Z","related":["MGASA-2019-0025","MGASA-2020-0204","SUSE-SU-2018:4179-1","SUSE-SU-2018:4183-1","SUSE-SU-2018:4210-1","SUSE-SU-2018:4210-2","SUSE-SU-2018:4294-1","SUSE-SU-2019:0447-1","SUSE-SU-2020:1021-1","openSUSE-SU-2019:0265-1","openSUSE-SU-2020:1452-1","openSUSE-SU-2020:1500-1","openSUSE-SU-2020:1501-1","openSUSE-SU-2020:1530-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00066.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3390"},{"type":"ADVISORY","url":"https://blog.qt.io/blog/2018/12/04/qt-5-11-3-released-important-security-updates/"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/05/msg00014.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2135"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/01/msg00004.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/09/msg00023.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4003-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4374"},{"type":"FIX","url":"https://codereview.qt-project.org/#/c/238749/"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00071.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00073.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00090.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00057.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/qt/qtbase","events":[{"introduced":"0"},{"last_affected":"6542161d5c698d461a11f0e5ca6cc2a00d33a824"},{"introduced":"6c1e352803a6efbd8b14e5296434e22165b65084"},{"last_affected":"49dc9aa409d727824f26b246054a22b5a7dd5980"},{"introduced":"50117d738af526cbfbd5afa50b9a501acb0fb9ce"},{"fixed":"08de243eaa007597c2bfbc97d3d14e2f821ac4be"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.5.1"},{"introduced":"5.7.0"},{"last_affected":"5.8.0"},{"introduced":"5.10.0"},{"fixed":"5.11.3"}]}}],"versions":["v5.0.0-beta1","v5.0.0-beta2","v5.11.0-alpha1","v5.11.0-beta1","v5.11.0-beta2","v5.11.0-beta3","v5.11.0-beta4","v5.5.0-alpha1","v5.5.0-beta1","v5.5.1","v5.8.0","v5.8.0-alpha1","v5.8.0-beta1","v5.8.0-rc1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"sle-15-sp1"}]},{"events":[{"introduced":"0"},{"last_affected":"sle-15-sp2"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"15.2"}]},{"events":[{"introduced":"0"},{"last_affected":"42.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-19873.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}