Updated libraw packages fix security vulnerabilities
Publication date: 31 Aug 2018Modification date: 17 Feb 2022
Type: security
Affected Mageia releases : 6
CVE: CVE-2018-5815 , CVE-2018-5816
Description
This update provides libraw 0.18.13 fixing at least the following security issues: LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow in the internal/dcraw_common.cpp:parse_qt() function. An attacker could exploit this to cause an infinite loop via a specially crafted Apple QuickTime file (CVE-2018-5815). LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow in the internal/dcraw_common.cpp:identify() function. An attacker could exploit this to cause an divide-by-zero and resultant denial of service via a specially crafted NOKIARAW file (CVE-2018-5816). libraw 0.18.13 adds fixes for: * possible stack overrun while reading zero-sized strings * possible integer overflow
References
- https://bugs.mageia.org/show_bug.cgi?id=23186
- https://bugzilla.suse.com/show_bug.cgi?id=1103206
- https://bugzilla.redhat.com/show_bug.cgi?id=1610156
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SAILUJLX73GTMC4BTJPFRXMDQIFLWFMV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5816
SRPMS
6/core
- libraw-0.18.13-1.mga6