Red Hat Bugzilla – Bug 1591887
CVE-2018-5805 LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp
Last modified: 2018-10-30 03:29:34 EDT
A boundary error within the "quicktake_100_load_raw()" function (internal/dcraw_common.cpp) can be exploited to cause a stack-based buffer overflow and subsequently cause a crash. References: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-03
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1591894] Affects: fedora-all [bug 1591891] Created dcraw tracking bugs for this issue: Affects: fedora-all [bug 1591889] Created libkdcraw tracking bugs for this issue: Affects: fedora-all [bug 1591893] Created mingw-LibRaw tracking bugs for this issue: Affects: fedora-all [bug 1591892] Created rawtherapee tracking bugs for this issue: Affects: fedora-all [bug 1591890]
Upstream fix: https://github.com/LibRaw/LibRaw/commit/9f26ce37f5be86ea11bfc6831366558650b1f6ff
Statement: This issue did not affect the versions of dcraw as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code. This issue affects the versions of dcraw as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2018:3065 https://access.redhat.com/errata/RHSA-2018:3065