Bug 1591887 (CVE-2018-5805)

Summary: CVE-2018-5805 LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: debarshir, extras-orphan, gwync, hobbes1069, jridky, manisandro, mattdm, mattia.verga, nphilipp, ry, sebastian, siddharth.kde, siddhesh, than, thibault.north
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: LibRaw 0.18.8 Doc Type: If docs needed, set a value
Doc Text:
LibRaw is vulnerable to stack-based buffer overflow in internal/dcraw_common.cpp:quicktake_100_load_raw() function when processing specially-crafted RAW data. An attacker could potentially use this flaw to cause an arbitrary code execution or denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:29:16 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1543597, 1591889, 1591890, 1591891, 1591892, 1591893, 1591894, 1610500, 1610509, 1610704, 1610705    
Bug Blocks: 1591907    

Description Pedro Sampaio 2018-06-15 18:08:49 UTC
A boundary error within the "quicktake_100_load_raw()" function
(internal/dcraw_common.cpp) can be exploited to cause a stack-based
buffer overflow and subsequently cause a crash.

References:

https://secuniaresearch.flexerasoftware.com/secunia_research/2018-03

Comment 1 Pedro Sampaio 2018-06-15 18:10:51 UTC
Created LibRaw tracking bugs for this issue:

Affects: epel-6 [bug 1591894]
Affects: fedora-all [bug 1591891]


Created dcraw tracking bugs for this issue:

Affects: fedora-all [bug 1591889]


Created libkdcraw tracking bugs for this issue:

Affects: fedora-all [bug 1591893]


Created mingw-LibRaw tracking bugs for this issue:

Affects: fedora-all [bug 1591892]


Created rawtherapee tracking bugs for this issue:

Affects: fedora-all [bug 1591890]

Comment 4 Adam Mariš 2018-07-31 19:14:59 UTC
Statement:

This issue did not affect the versions of dcraw as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code.

This issue affects the versions of dcraw as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Comment 6 errata-xmlrpc 2018-10-30 07:29:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3065 https://access.redhat.com/errata/RHSA-2018:3065

Comment 7 Debarshi Ray 2018-11-22 16:31:43 UTC
This was fixed in LibRaw-0.18.8 and LibRaw-0.19.0-Beta1.