
CVE-2020-35530
https://notcve.org/view.php?id=CVE-2020-35530
01 Sep 2022 — In LibRaw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted X3F file. En LibRaw, se presenta una vulnerabilidad de escritura fuera de límites en la función "new_node()" (libraw\src\x3f\x3f_utils_patched.cpp) que puede desencadenarse por medio de un archivo X3F diseñado • https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb • CWE-787: Out-of-bounds Write •

CVE-2020-35531 – Ubuntu Security Notice USN-7266-1
https://notcve.org/view.php?id=CVE-2020-35531
01 Sep 2022 — In LibRaw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función get_huffman_diff() (libraw\src\x3f\x3f_utils_patched.cpp) cuando son leídos datos de un archivo de imagen Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in digiKam, did not correctly parse certain files. An attacker could possibly... • https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68 • CWE-125: Out-of-bounds Read •

CVE-2020-35532 – Ubuntu Security Notice USN-7266-1
https://notcve.org/view.php?id=CVE-2020-35532
01 Sep 2022 — In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función "simple_decode_row()" (libraw\src\x3f\x3f_utils_patched.cpp) que puede desencadenarse por medio de una imagen con un campo row_stride grande Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in digiKam... • https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e • CWE-125: Out-of-bounds Read •

CVE-2020-24870 – LibRaw: Stack buffer overflow in LibRaw::identify_process_dng_fields() in identify.cpp
https://notcve.org/view.php?id=CVE-2020-24870
02 Jun 2021 — Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp. Libraw versiones anteriores a 0.20.1, tiene un desbordamiento del búfer de lapila por medio de la función LibRaw::identify_process_dng_fields en el archivo identify.cpp A stack buffer overflow vulnerability was found in LibRaw. This flaw allows a malicious user to send a crafted image that, when parsed by an application linked to LibRaw, leads to a denial of service or potential code execution. GNOME is... • https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2020-24889 – Gentoo Linux Security Advisory 202010-05
https://notcve.org/view.php?id=CVE-2020-24889
16 Sep 2020 — A buffer overflow vulnerability in LibRaw version < 20.0 LibRaw::GetNormalizedModel in src/metadata/normalize_model.cpp may lead to context-dependent arbitrary code execution. Una vulnerabilidad de desbordamiento de búfer en LibRaw versiones anteriores a 20.0, la función LibRaw::GetNormalizedModel en el archivo src/metadata/normalize_model.cpp puede conllevar a una ejecución de código arbitraria dependiendo del contexto Multiple vulnerabilities have been found in LibRaw, the worst of which may allow attacke... • https://github.com/LibRaw/LibRaw/issues/334 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2020-24890 – Gentoo Linux Security Advisory 202010-05
https://notcve.org/view.php?id=CVE-2020-24890
16 Sep 2020 — libraw 20.0 has a null pointer dereference vulnerability in parse_tiff_ifd in src/metadata/tiff.cpp, which may result in context-dependent arbitrary code execution. Note: this vulnerability occurs only if you compile the software in a certain way ** EN DISPUTA ** libraw versión 20.0, presenta una vulnerabilidad de desreferencia del puntero null en la función parse_tiff_ifd en el archivo src/metadata/tiff.cpp, que puede resultar en una ejecución de código arbitraria dependiendo del contexto. Nota: esta vulne... • https://github.com/LibRaw/LibRaw/issues/335 • CWE-476: NULL Pointer Dereference •

CVE-2020-15503 – LibRaw: lack of thumbnail size range check can lead to buffer overflow
https://notcve.org/view.php?id=CVE-2020-15503
02 Jul 2020 — LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength. LibRaw versiones anteriores a 0.20-RC1, carece de una comprobación de rango de tamaño de miniaturas. Esto afecta a los archivos decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, y utils/thumb_utils.cpp. • http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00075.html • CWE-20: Improper Input Validation CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2020-15365
https://notcve.org/view.php?id=CVE-2020-15365
28 Jun 2020 — LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds. LibRaw versiones anteriores a 0.20-Beta3, presenta una escritura fuera de límites en la función parse_exif() en el archivo metadata\exif_gps.cpp por medio de un AtomName no reconocido y un valor cero de tiff_nifds • https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3 • CWE-787: Out-of-bounds Write •

CVE-2018-20365
https://notcve.org/view.php?id=CVE-2018-20365
22 Dec 2018 — LibRaw::raw2image() in libraw_cxx.cpp has a heap-based buffer overflow. LibRaw::raw2image() en libraw_cxx.cpp tiene un desbordamiento de búfer basado en memoria dinámica (heap). • http://www.securityfocus.com/bid/106299 • CWE-787: Out-of-bounds Write •

CVE-2018-20364
https://notcve.org/view.php?id=CVE-2018-20364
22 Dec 2018 — LibRaw::copy_bayer in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference. LibRaw::copy_bayer en libraw_cxx.cpp en LibRaw 0.19.1 tiene una desreferencia de puntero NULL. • http://www.securityfocus.com/bid/106299 • CWE-476: NULL Pointer Dereference •