A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) can be exploited to cause a stack-based buffer overflow and subsequently cause a crash. References: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-03
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1591894] Affects: fedora-all [bug 1591891] Created dcraw tracking bugs for this issue: Affects: fedora-all [bug 1591889] Created libkdcraw tracking bugs for this issue: Affects: fedora-all [bug 1591893] Created mingw-LibRaw tracking bugs for this issue: Affects: fedora-all [bug 1591892] Created rawtherapee tracking bugs for this issue: Affects: fedora-all [bug 1591890]
Upstream fix: https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff
Statement: This issue did not affect the versions of dcraw as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code. This issue affects the versions of dcraw as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3065 https://access.redhat.com/errata/RHSA-2018:3065
This was fixed in LibRaw-0.18.8 and LibRaw-0.19.0-Beta1.