{"id":"RHSA-2018:3065","summary":"Red Hat Security Advisory: libkdcraw security update","modified":"2026-03-11T07:14:16.614466Z","published":"2024-09-16T01:12:48Z","upstream":["CVE-2018-5800","CVE-2018-5801","CVE-2018-5802","CVE-2018-5805","CVE-2018-5806"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3065"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"ARTICLE","url":"https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553332"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1553335"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1591887"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1591897"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_3065.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5800"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5800"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5800"},{"type":"ARTICLE","url":"https://packetstormsecurity.com/files/146172/secunia-libraw.txt"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5801"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5801"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5801"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5802"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5802"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5802"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5805"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5805"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5805"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2018-5806"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2018-5806"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5806"}],"affected":[{"package":{"name":"libkdcraw","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libkdcraw"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libkdcraw-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libkdcraw-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libkdcraw"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libkdcraw-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libkdcraw-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libkdcraw"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libkdcraw-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}},{"package":{"name":"libkdcraw-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libkdcraw-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:4.10.5-5.el7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2018:3065.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}