{"id":"CVE-2018-5815","details":"An integer overflow error within the \"parse_qt()\" function (internal/dcraw_common.cpp) in LibRaw versions prior to 0.18.12 can be exploited to trigger an infinite loop via a specially crafted Apple QuickTime file.","modified":"2026-04-16T01:44:27.234876623Z","published":"2018-12-07T22:29:01.613Z","related":["SUSE-SU-2019:0005-1","openSUSE-SU-2019:0008-1","openSUSE-SU-2024:10980-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"14.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"16.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"},{"extracted_events":[{"last_affected":"18.04"}],"cpe":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://github.com/LibRaw/LibRaw/blob/master/Changelog.txt"},{"type":"ADVISORY","url":"https://secuniaresearch.flexerasoftware.com/secunia_research/2018-14/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3838-1/"},{"type":"REPORT","url":"https://secuniaresearch.flexerasoftware.com/advisories/83507/"},{"type":"FIX","url":"https://github.com/LibRaw/LibRaw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libraw/libraw","events":[{"introduced":"0"},{"fixed":"6c62f2b45c290c25371492bbd7bae431b3cddd48"},{"fixed":"1334647862b0c90b2e8cb2f668e66627d9517b17"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"0.18.12"}],"cpe":"cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"]}}],"versions":["0.12.0","0.13.0","0.13.1","0.13.2","0.13.3","0.13.4","0.13.5","0.13.6","0.14.0","0.14.1","0.14.2","0.14.3","0.14.4","0.14.5","0.14.6","0.15.0","0.16.0","0.17.0","0.18.0","0.18.1","0.18.10","0.18.11","0.18.2","0.18.3","0.18.4","0.18.5","0.18.6","0.18.7","0.18.9"],"database_specific":{"vanir_signatures_modified":"2026-04-11T21:32:52Z","vanir_signatures":[{"id":"CVE-2018-5815-15c547f1","digest":{"length":487,"function_hash":"332654752014799311762317652767049922768"},"target":{"file":"dcraw/dcraw.c","function":"parse_qt"},"deprecated":false,"signature_type":"Function","signature_version":"v1","source":"https://github.com/libraw/libraw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"},{"digest":{"length":487,"function_hash":"332654752014799311762317652767049922768"},"id":"CVE-2018-5815-3b62e427","target":{"file":"internal/dcraw_common.cpp","function":"parse_qt"},"deprecated":false,"signature_type":"Function","signature_version":"v1","source":"https://github.com/libraw/libraw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"},{"digest":{"line_hashes":["162340819845460020987462871290996818593","273570596699015872851700447841487179902","231276055567181569759474760943651915664","28509251757216518146565145547809995346"],"threshold":0.9},"id":"CVE-2018-5815-669ffb7a","target":{"file":"internal/dcraw_common.cpp"},"deprecated":false,"signature_type":"Line","signature_version":"v1","source":"https://github.com/libraw/libraw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"},{"id":"CVE-2018-5815-75b89242","digest":{"line_hashes":["162340819845460020987462871290996818593","273570596699015872851700447841487179902","231276055567181569759474760943651915664","28509251757216518146565145547809995346"],"threshold":0.9},"target":{"file":"dcraw/dcraw.c"},"deprecated":false,"signature_type":"Line","signature_version":"v1","source":"https://github.com/libraw/libraw/commit/1334647862b0c90b2e8cb2f668e66627d9517b17"}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-5815.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}