Security
Headlines
HeadlinesLatestCVEs

Headline

Gentoo Linux Security Advisory 202312-08

Gentoo Linux Security Advisory 202312-8 - A vulnerability has been found in LibRaw where a heap buffer overflow may lead to an application crash. Versions greater than or equal to 0.21.1-r1 are affected.

Packet Storm
#vulnerability#web#mac#linux#git#buffer_overflow

Gentoo Linux Security Advisory GLSA 202312-08


                                       https://security.gentoo.org/  

Severity: High
Title: LibRaw: Heap Buffer Overflow
Date: December 22, 2023
Bugs: #908041
ID: 202312-08


Synopsis

A vulnerability has been found in LibRaw where a heap buffer overflow
may lead to an application crash.

Background

LibRaw is a library for reading RAW files obtained from digital photo
cameras.

Affected packages

Package Vulnerable Unaffected


media-libs/libraw < 0.21.1-r1 >= 0.21.1-r1

Description

A vulnerability has been discovered in LibRaw. Please review the CVE
identifier referenced below for details.

Impact

A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted
file may lead to an application crash.

Workaround

There is no known workaround at this time.

Resolution

All LibRaw users should upgrade to the latest version:

emerge --sync

emerge --ask --oneshot --verbose “>=media-libs/libraw-0.21.1-r1”

References

[ 1 ] CVE-2023-1729
https://nvd.nist.gov/vuln/detail/CVE-2023-1729

Availability

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202312-08

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
[email protected] or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5

Related news

Ubuntu Security Notice USN-6137-1

Ubuntu Security Notice 6137-1 - It was discovered that LibRaw incorrectly handled photo files. If a user or automated system were tricked into processing a specially crafted photo file, a remote attacker could cause applications linked against LibRaw to crash, resulting in a denial of service, or possibly execute arbitrary code.

Debian Security Advisory 5412-1

Debian Linux Security Advisory 5412-1 - Several vulnerabilities were discovered in libraw, a library for reading RAW files obtained from digital photo cameras, which may result in denial of service or the execution of arbitrary code if specially crafted files are processed.

CVE-2023-1729: Invalid Bug ID

A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution