Arch Linux alert ASA-201805-2 (libraw)
From: | Jelle van der Waa <jelle@archlinux.org> | |
To: | arch-security@archlinux.org | |
Subject: | [ASA-201805-2] libraw: multiple issues | |
Date: | Wed, 9 May 2018 22:12:39 +0200 | |
Message-ID: | <20180509201238.v5t7kzy2uqburtpe@mail.archlinux.org> |
Arch Linux Security Advisory ASA-201805-2 ========================================= Severity: Critical Date : 2018-05-09 CVE-ID : CVE-2018-10528 CVE-2018-10529 Package : libraw Type : multiple issues Remote : Yes Link : https://security.archlinux.org/AVG-681 Summary ======= The package libraw before version 0.18.10-1 is vulnerable to multiple issues including arbitrary code execution and information disclosure. Resolution ========== Upgrade to 0.18.10-1. # pacman -Syu "libraw>=0.18.10-1" The problems have been fixed upstream in version 0.18.10. Workaround ========== None. Description =========== - CVE-2018-10528 (arbitrary code execution) A stack-based buffer overflow has been found in LibRaw before 0.18.10, in the utf2char() function in libraw_cxx.cpp. - CVE-2018-10529 (information disclosure) An out-of-bounds read has been found in LibRaw before 0.18.10, in the X3F property table list implementation in libraw_x3f.cpp and libraw_cxx.cpp Impact ====== A remote attacker is able to execute arbitrary code or disclose information by providing a specially crafted file. References ========== https://bugs.archlinux.org/task/58393 https://github.com/LibRaw/LibRaw/issues/144 https://github.com/LibRaw/LibRaw/commit/895529fc2f2eb8bc6... https://github.com/LibRaw/LibRaw/commit/6f89e5505b1759b78... https://github.com/LibRaw/LibRaw/commit/efd8cfabb93fd0396... https://github.com/LibRaw/LibRaw/commit/f0c505a3e5d47989a... https://github.com/LibRaw/LibRaw/commit/6b08eae24034789b3... https://security.archlinux.org/CVE-2018-10528 https://security.archlinux.org/CVE-2018-10529