CVE-2018-5811
https://notcve.org/view.php?id=CVE-2018-5811
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash. Un error en la función "nikon_coolscan_load_raw()" (internal/dcraw_common.cpp) en LibRaw en versiones anteriores a la 0.18.9 se puede explotar para provocar un acceso de lectura a la memoria fuera de límites y un cierre inesperado. • https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 https://secuniaresearch.flexerasoftware.com/advisories/81800 https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10 https://usn.ubuntu.com/3838-1 • CWE-125: Out-of-bounds Read •
CVE-2018-5810
https://notcve.org/view.php?id=CVE-2018-5810
An error within the "rollei_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash. Un error en la función "rollei_load_raw()" (internal/dcraw_common.cpp) en las versiones anteriores a la 0.18.9 de LibRaw puede explotarse para provocar un desbordamiento de búfer basado en memoria dinámica (heap) y un cierre inesperado. • https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 https://secuniaresearch.flexerasoftware.com/advisories/81800 https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10 https://usn.ubuntu.com/3838-1 • CWE-787: Out-of-bounds Write •
CVE-2018-5812
https://notcve.org/view.php?id=CVE-2018-5812
An error within the "nikon_coolscan_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to trigger a NULL pointer dereference. Un error en la función "nikon_coolscan_load_raw()" (internal/dcraw_common.cpp) en LibRaw, en versiones anteriores a la 0.18.9, puede explotarse para desencadenar una desreferencia de puntero NULL. • https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 https://secuniaresearch.flexerasoftware.com/advisories/81800 https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10 https://usn.ubuntu.com/3838-1 • CWE-476: NULL Pointer Dereference •
CVE-2018-5807
https://notcve.org/view.php?id=CVE-2018-5807
An error within the "samsung_load_raw()" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.9 can be exploited to cause an out-of-bounds read memory access and subsequently cause a crash. Un error en la función "samsung_load_raw()" (internal/dcraw_common.cpp) en LibRaw en versiones anteriores a la 0.18.9 se puede explotar para provocar un acceso de lectura a la memoria fuera de límites y un cierre inesperado. • https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt https://github.com/LibRaw/LibRaw/commit/fd6330292501983ac75fe4162275794b18445bd9 https://secuniaresearch.flexerasoftware.com/advisories/81800 https://secuniaresearch.flexerasoftware.com/secunia_research/2018-10 https://usn.ubuntu.com/3838-1 • CWE-125: Out-of-bounds Read •
CVE-2018-19854 – kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c
https://notcve.org/view.php?id=CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option). Se ha descubierto un problema en el kernel de Linux hasta antes de la versión 4.19.3. crypto_report_one() y otras funciones relacionadas en crypto/crypto_user.c (la API de configuración de usuarios crypto) no inicializan completamente las estructuras que se copian en el espacio de usuario, lo que podría filtrar memoria sensible a los programas del usuario. NOTA: esta es una regresión de CVE-2013-2547, pero con una explotabilidad más sencilla. Esto se deba a que el atacante no necesita una capacidad (sin embargo, el sistema debe tener la opción de kconfig CONFIG_CRYPTO_USER). • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087 https://access.redhat.com/errata/RHSA-2019:3309 https://access.redhat.com/errata/RHSA-2019:3517 https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3 https://usn.ubuntu.com/3872-1 https://usn.ubuntu.com/3878-1 https://usn.ubuntu.com/3878-2 https://usn.ubuntu.com/3901-1 https:/ • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •