First published: Thu Mar 08 2018(Updated: )
An off-by-one error within the "LibRaw::kodak_ycbcr_load_raw()" function (internal/dcraw_common.cpp) can be exploited to cause a heap-based buffer overflow and subsequently cause a crash. External References: <a href="https://packetstormsecurity.com/files/146172/secunia-libraw.txt">https://packetstormsecurity.com/files/146172/secunia-libraw.txt</a> Upstream Patch: <a href="https://github.com/LibRaw/LibRaw/commit/8682ad204392b91">https://github.com/LibRaw/LibRaw/commit/8682ad204392b91</a>
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/LibRaw | <0.18.7 | 0.18.7 |
debian/libraw | 0.20.2-1+deb11u1 0.20.2-2.1 0.21.2-2.1 | |
LibRaw | <0.18.7 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux workstation | =7.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =17.10 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-5800 refers to an off-by-one error within the LibRaw::kodak_ycbcr_load_raw() function, which can lead to a heap-based buffer overflow and crash.
CVE-2018-5800 has a severity rating of 6.5 out of 10.
LibRaw versions prior to 0.18.7 are affected by CVE-2018-5800.
To fix CVE-2018-5800, update to LibRaw version 0.18.7 or later.
You can find more information about CVE-2018-5800 at the following references: [1](http://www.securityfocus.com/bid/104663), [2](https://access.redhat.com/errata/RHSA-2018:3065), [3](https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt)