Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1610479 (CVE-2018-5810)
Summary: | CVE-2018-5810 libRaw: heap-based buffer overflow in rollei_load_raw in internal/dcraw_common.cpp | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | debarshir, gwync, hobbes1069, manisandro, siddharth.kde, siddhesh |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | LibRaw 0.18.9 | Doc Type: | If docs needed, set a value |
Doc Text: |
A heap-based buffer overflow has been discovered in LibRaw, in the way rollei_load_raw() function in internal/dcraw_common.cpp file handles the input image. An attacker could trigger the flaw by providing a specially crafted Rollei RAW Image, which could result in a crash or other unspecified effects.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-04-22 04:32:01 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1543597, 1610480, 1613945, 1826586 | ||
Bug Blocks: |
Description
Laura Pardo
2018-07-31 17:34:14 UTC
Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1610480] Function rollei_load_raw() does not check whether the index used to access the raw_image array is in bounds, thus a crafted raw image could cause a heap-based buffer overflow, which could result in a crash or in other unspecified effects. This was fixed in LibRaw-0.18.9 and LibRaw-0.19.0-Beta3. Created LibRaw tracking bugs for this issue: Affects: epel-6 [bug 1826586] This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-5810 |