rpm package
suse/libraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP5
pkg:rpm/suse/libraw&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5
Vulnerabilities (4)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-22628 | — | < 0.15.4-42.1 | 0.15.4-42.1 | Aug 22, 2023 | Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. | ||
| CVE-2023-1729 | — | < 0.15.4-39.1 | 0.15.4-39.1 | May 15, 2023 | A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash. | ||
| CVE-2021-32142 | — | < 0.15.4-36.1 | 0.15.4-36.1 | Feb 17, 2023 | Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. | ||
| CVE-2020-15503 | — | < 0.15.4-33.1 | 0.15.4-33.1 | Jul 2, 2020 | LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength. |
- CVE-2020-22628Aug 22, 2023affected < 0.15.4-42.1fixed 0.15.4-42.1
Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.
- CVE-2023-1729May 15, 2023affected < 0.15.4-39.1fixed 0.15.4-39.1
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
- CVE-2021-32142Feb 17, 2023affected < 0.15.4-36.1fixed 0.15.4-36.1
Buffer Overflow vulnerability in LibRaw linux/unix v0.20.0 allows attacker to escalate privileges via the LibRaw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp.
- CVE-2020-15503Jul 2, 2020affected < 0.15.4-33.1fixed 0.15.4-33.1
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.