Описание
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
Отчет
While the vulnerable code exists in versions of LibRaw shipped with Red Hat Enterprise Linux 7 and 8, LibRaw is not used in services which accept data directly from a network, reducing impact.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | dcraw | Not affected | ||
Red Hat Enterprise Linux 7 | dcraw | Not affected | ||
Red Hat Enterprise Linux 7 | libkdcraw | Not affected | ||
Red Hat Enterprise Linux 7 | LibRaw | Fix deferred | ||
Red Hat Enterprise Linux 8 | dcraw | Not affected | ||
Red Hat Enterprise Linux 8 | LibRaw | Fixed | RHSA-2020:4451 | 04.11.2020 |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength.
LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affect ...
EPSS
7.5 High
CVSS3