Mageia 2018-0356: libraw security update
Summary
This update provides libraw 0.18.13 fixing atleast the following
security issues:
LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow
in the internal/dcraw_common.cpp:parse_qt() function. An attacker could
exploit this to cause an infinite loop via a specially crafted Apple
QuickTime file (CVE-2018-5815).
LibRaw versions prior to 0.18.12 are vulnerable to an integer overflow
in the internal/dcraw_common.cpp:identify() function. An attacker could
exploit this to cause an divide-by-zero and resultant denial of service
via a specially crafted NOKIARAW file (CVE-2018-5816).
libraw 0.18.13 adds fixes for:
* possible stack overrun while reading zero-sized strings
* possible integer overflow
References
- https://bugs.mageia.org/show_bug.cgi?id=23186
- https://bugzilla.suse.com/show_bug.cgi?id=1103206
- https://bugzilla.redhat.com/show_bug.cgi?id=1610156
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SAILUJLX73GTMC4BTJPFRXMDQIFLWFMV/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5815
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5816
Resolution
MGASA-2018-0356 - Updated libraw packages fix security vulnerabilities
SRPMS
- 6/core/libraw-0.18.13-1.mga6