CVE-2020-35532
Ubuntu Security Notice USN-7266-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
En LibRaw, se presenta una vulnerabilidad de lectura fuera de límites dentro de la función "simple_decode_row()" (libraw\src\x3f\x3f_utils_patched.cpp) que puede desencadenarse por medio de una imagen con un campo row_stride grande
Zinuo Han and Ao Wang discovered that the Android DNG SDK, vendored in digiKam, did not correctly parse certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. It was discovered that Platinum Upnp SDK, vendored in digiKam, was vulnerable to a path traversal attack. An attacker could possibly use this issue to leak sensitive information. This issue only affected Ubuntu 20.04 LTS.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-17 CVE Reserved
- 2022-09-01 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-125: Out-of-bounds Read
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | Mailing List |
|
URL | Date | SRC |
---|---|---|
https://github.com/LibRaw/LibRaw/issues/271 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e | 2022-09-29 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libraw Search vendor "Libraw" | Libraw Search vendor "Libraw" for product "Libraw" | 0.20.0 Search vendor "Libraw" for product "Libraw" and version "0.20.0" | - |
Affected
| ||||||
Libraw Search vendor "Libraw" | Libraw Search vendor "Libraw" for product "Libraw" | 0.20.0 Search vendor "Libraw" for product "Libraw" and version "0.20.0" | rc2 |
Affected
| ||||||
Libraw Search vendor "Libraw" | Libraw Search vendor "Libraw" for product "Libraw" | 0.20.1 Search vendor "Libraw" for product "Libraw" and version "0.20.1" | - |
Affected
| ||||||
Libraw Search vendor "Libraw" | Libraw Search vendor "Libraw" for product "Libraw" | 0.20.2 Search vendor "Libraw" for product "Libraw" and version "0.20.2" | - |
Affected
| ||||||
Libraw Search vendor "Libraw" | Libraw Search vendor "Libraw" for product "Libraw" | 0.21.0 Search vendor "Libraw" for product "Libraw" and version "0.21.0" | beta1 |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
|