Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 1591887 - (CVE-2018-5805) CVE-2018-5805 LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp
CVE-2018-5805 LibRaw: Stack-based buffer overflow in quicktake_100_load_raw()...
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180314,repor...
: Security
Depends On: 1591891 1591893 1591894 1610705 1591889 1591890 1591892 1610500 1610509 1610704
Blocks: 1591907
  Show dependency treegraph
 
Reported: 2018-06-15 14:08 EDT by Pedro Sampaio
Modified: 2018-10-30 03:29 EDT (History)
15 users (show)

See Also:
Fixed In Version: LibRaw 0.18.8
Doc Type: If docs needed, set a value
Doc Text:
LibRaw is vulnerable to stack-based buffer overflow in internal/dcraw_common.cpp:quicktake_100_load_raw() function when processing specially-crafted RAW data. An attacker could potentially use this flaw to cause an arbitrary code execution or denial of service.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3065 None None None 2018-10-30 03:29 EDT

  None (edit)
Description Pedro Sampaio 2018-06-15 14:08:49 EDT
A boundary error within the "quicktake_100_load_raw()" function
(internal/dcraw_common.cpp) can be exploited to cause a stack-based
buffer overflow and subsequently cause a crash.

References:

https://secuniaresearch.flexerasoftware.com/secunia_research/2018-03
Comment 1 Pedro Sampaio 2018-06-15 14:10:51 EDT
Created LibRaw tracking bugs for this issue:

Affects: epel-6 [bug 1591894]
Affects: fedora-all [bug 1591891]


Created dcraw tracking bugs for this issue:

Affects: fedora-all [bug 1591889]


Created libkdcraw tracking bugs for this issue:

Affects: fedora-all [bug 1591893]


Created mingw-LibRaw tracking bugs for this issue:

Affects: fedora-all [bug 1591892]


Created rawtherapee tracking bugs for this issue:

Affects: fedora-all [bug 1591890]
Comment 4 Adam Mariš 2018-07-31 15:14:59 EDT
Statement:

This issue did not affect the versions of dcraw as shipped with Red Hat Enterprise Linux 5 as they did not include the vulnerable code.

This issue affects the versions of dcraw as shipped with Red Hat Enterprise Linux 6. Red Hat Enterprise Linux 6 is now in Maintenance Support 2 Phase of the support and maintenance life cycle. This has been rated as having a security impact of Moderate, and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Comment 6 errata-xmlrpc 2018-10-30 03:29:24 EDT
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3065 https://access.redhat.com/errata/RHSA-2018:3065

Note You need to log in before you can comment on or make changes to this bug.