{"id":"MGASA-2018-0356","summary":"Updated libraw packages fix security vulnerabilities","details":"This update provides libraw 0.18.13 fixing at least the following\nsecurity issues:\n\nLibRaw versions prior to 0.18.12 are vulnerable to an integer overflow\nin the internal/dcraw_common.cpp:parse_qt() function. An attacker could\nexploit this to cause an infinite loop via a specially crafted Apple\nQuickTime file (CVE-2018-5815).\n\nLibRaw versions prior to 0.18.12 are vulnerable to an integer overflow\nin the internal/dcraw_common.cpp:identify() function. An attacker could\nexploit this to cause an divide-by-zero and resultant denial of service\nvia a specially crafted NOKIARAW file (CVE-2018-5816).\n\nlibraw 0.18.13 adds fixes for: \n* possible stack overrun while reading zero-sized strings\n* possible integer overflow\n","modified":"2026-04-16T06:25:56.797802313Z","published":"2018-08-31T21:11:59Z","upstream":["CVE-2018-5815","CVE-2018-5816"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0356.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23186"},{"type":"REPORT","url":"https://bugzilla.suse.com/show_bug.cgi?id=1103206"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1610156"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SAILUJLX73GTMC4BTJPFRXMDQIFLWFMV/"}],"affected":[{"package":{"name":"libraw","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/libraw?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0.18.13-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0356.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}