QID 356139

Date Published: 2023-09-25

QID 356139: Amazon Linux Security Advisory for LibRaw : ALAS2-2023-2256

Buffer overflow vulnerability in libraw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. (
( CVE-2020-22628) in libraw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted x3f file. (
( CVE-2020-35530) in libraw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. (
( CVE-2020-35531) in libraw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. (
( CVE-2020-35532) buffer overflow vulnerability in libraw linux/unix v0.20.0 allows attacker to escalate privileges via the libraw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. (
( CVE-2021-32142)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2-2023-2256 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2-2023-2256 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALAS-2023-2256.html