Red Hat Bugzilla – Bug 1574313
CVE-2018-10528 LibRaw: Stack-based buffer overflow in libraw_cxx.cpp:utf2char() allows for potential code execution
Last modified: 2018-09-27 10:17:23 EDT
LibRaw through version 0.18.9 is vulnerable to a stack-based buffer overflow in the libraw_cxx.cpp:utf2char() function. An attacker could exploit this to cause a crash or potentially execute arbitrary code. Upstream Issue: https://github.com/LibRaw/LibRaw/issues/144 Upstream Patch: https://github.com/LibRaw/LibRaw/commit/895529fc2f2eb8bc633edd6b04b5b237eb4db564
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1574321] Affects: fedora-all [bug 1574322] Created mingw-LibRaw tracking bugs for this issue: Affects: fedora-all [bug 1574319]
This was fixed in LibRaw 0.19.0-Beta4 and 0.18.10.