Bugzilla – Bug 1091345
VUL-0: CVE-2018-10528: libraw: There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp.
Last modified: 2018-06-13 15:49:08 UTC
CVE-2018-10528 An issue was discovered in LibRaw 0.18.9. There is a stack-based buffer overflow in the utf2char function in libraw_cxx.cpp. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10528 https://github.com/LibRaw/LibRaw/issues/144 https://github.com/LibRaw/LibRaw/commit/895529fc2f2eb8bc633edd6b04b5b237eb4db564
Submitted to Tumbleweed and sle15.
This is an autogenerated message for OBS integration: This bug (1091345) was mentioned in https://build.opensuse.org/request/show/602481 Factory / libraw
openSUSE:Leap:42.3:Update/libraw has 0.17.1 Please submit a maintenance update there.
Done.
This is an autogenerated message for OBS integration: This bug (1091345) was mentioned in https://build.opensuse.org/request/show/602522 42.3 / libraw
openSUSE-SU-2018:1138-1: An update that fixes two vulnerabilities is now available. Category: security (moderate) Bug References: 1091345,1091346 CVE References: CVE-2018-10528,CVE-2018-10529 Sources used: openSUSE Leap 42.3 (src): libraw-0.17.1-20.1
released