Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-35532

Опубликовано: 01 сент. 2022
Источник: debian

Описание

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
librawfixed0.20.0-4package

Примечания

  • https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e (0.20-RC2)

  • https://github.com/LibRaw/LibRaw/issues/271

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 3 лет назад

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

CVSS3: 5.5
redhat
почти 6 лет назад

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

CVSS3: 5.5
nvd
больше 3 лет назад

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

CVSS3: 5.5
github
больше 3 лет назад

In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.

CVSS3: 5.5
fstec
больше 3 лет назад

Уязвимость компонента x3f_utils_patched.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю вызвать отказ в обслуживании