Bug 1663964 (CVE-2018-20365)

Summary: CVE-2018-20365 libraw: Heap-based buffer overflow in LibRaw::raw2image() resulting in a denial of service
Product: [Other] Security Response Reporter: Andrej Nemec <anemec>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: debarshir
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-22 04:32:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1663965, 1663967, 1663968, 1671033, 1671034, 1671744, 1741274    
Bug Blocks: 1663970    

Description Andrej Nemec 2019-01-07 12:18:03 UTC
A Heap-based buffer overflow was found in LibRaw::raw2image() function. A maliciously crafted file could cause the application to crash.

Upstream issue:

https://github.com/LibRaw/LibRaw/issues/195

Comment 1 Andrej Nemec 2019-01-07 12:18:44 UTC
Created LibRaw tracking bugs for this issue:

Affects: epel-6 [bug 1663968]
Affects: fedora-all [bug 1663965]


Created mingw-LibRaw tracking bugs for this issue:

Affects: fedora-all [bug 1663967]

Comment 2 Riccardo Schirone 2019-01-30 10:28:53 UTC
Upstream patch:
https://github.com/LibRaw/LibRaw/commit/9b5c50d5fdf6d1386a31f08ecdae3a752fe63d07

Comment 3 Riccardo Schirone 2019-01-30 10:48:24 UTC
When opening Sinar raw images that enable filters, the image data are updated in the wrong way in libraw_cxx.cpp:open_datastream(), causing an heap-based buffer overflow in raw2image() function later on.

Comment 5 Debarshi Ray 2019-02-01 13:51:06 UTC
Should be fixed in LibRaw-0.19.3.

Comment 8 Product Security DevOps Team 2020-04-22 04:32:17 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2018-20365