Source: libraw Version: 0.19.5-1 Severity: important Tags: security upstream Control: found -1 0.19.2-2
Hi, The following vulnerability was published for libraw. CVE-2020-15503[0]: | LibRaw before 0.20-RC1 lacks a thumbnail size range check. This | affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and | utils/thumb_utils.cpp. For example, | malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without | validating T.tlength. Note that for older versions we need to look at libraw_cxx.cpp instead. The Red Hat report contains a backported patch which might help. FWIW the issue is low, and does not need a DSA, but can be fixed via a point release. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-15503 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15503 [1] https://bugzilla.redhat.com/show_bug.cgi?id=1853477 Regards, Salvatore