MGASA-2018-0356 - Updated libraw packages fix security vulnerabilities

Publication date: 31 Aug 2018
URL: https://advisories.mageia.org/MGASA-2018-0356.html
Type: security
Affected Mageia releases: 6
CVE: CVE-2018-5815,
     CVE-2018-5816

This update provides libraw 0.18.13 fixing atleast the following
security issues:

LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow
in the internal/dcraw_common.cpp:parse_qt() function. An attacker could
exploit this to cause an infinite loop via a specially crafted Apple
QuickTime file (CVE-2018-5815).

LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow
in the internal/dcraw_common.cpp:identify() function. An attacker could
exploit this to cause an divide-by-zero and resultant denial of service
via a specially crafted NOKIARAW file (CVE-2018-5816).

libraw 0.18.13 adds fixes for: 
* possible stack overrun while reading zero-sized strings
* possible integer overflow

References:
- https://bugs.mageia.org/show_bug.cgi?id=23186
- https://bugzilla.suse.com/show_bug.cgi?id=1103206
- https://bugzilla.redhat.com/show_bug.cgi?id=1610156
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SAILUJLX73GTMC4BTJPFRXMDQIFLWFMV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5816

SRPMS:
- 6/core/libraw-0.18.13-1.mga6

Mageia 2018-0356: libraw security update

This update provides libraw 0.18.13 fixing atleast the following security issues: LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow in the internal/dcraw_comm...

Summary

This update provides libraw 0.18.13 fixing atleast the following security issues:
LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow in the internal/dcraw_common.cpp:parse_qt() function. An attacker could exploit this to cause an infinite loop via a specially crafted Apple QuickTime file (CVE-2018-5815).
LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow in the internal/dcraw_common.cpp:identify() function. An attacker could exploit this to cause an divide-by-zero and resultant denial of service via a specially crafted NOKIARAW file (CVE-2018-5816).
libraw 0.18.13 adds fixes for: * possible stack overrun while reading zero-sized strings * possible integer overflow

References

- https://bugs.mageia.org/show_bug.cgi?id=23186

- https://bugzilla.suse.com/show_bug.cgi?id=1103206

- https://bugzilla.redhat.com/show_bug.cgi?id=1610156

- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SAILUJLX73GTMC4BTJPFRXMDQIFLWFMV/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5815

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5816

Resolution

MGASA-2018-0356 - Updated libraw packages fix security vulnerabilities

SRPMS

- 6/core/libraw-0.18.13-1.mga6

Severity
Publication date: 31 Aug 2018
URL: https://advisories.mageia.org/MGASA-2018-0356.html
Type: security
CVE: CVE-2018-5815, CVE-2018-5816

Related News