A flaw was found in LibRaw versions before 0.18.9. An error within the rollei_load_raw() function (internal/dcraw_common.cpp) can be exploited to cause a heap-based buffer overflow and subsequently cause a crash. References: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10/
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1610480]
Upstream patch: https://github.com/LibRaw/LibRaw/commit/c9d8143eba4ff397163665e2119c6c5d7db54c55
Function rollei_load_raw() does not check whether the index used to access the raw_image array is in bounds, thus a crafted raw image could cause a heap-based buffer overflow, which could result in a crash or in other unspecified effects.
This was fixed in LibRaw-0.18.9 and LibRaw-0.19.0-Beta3.
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1826586]
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-5810