QID 356139
Date Published: 2023-09-25
QID 356139: Amazon Linux Security Advisory for LibRaw : ALAS2-2023-2256
Buffer overflow vulnerability in libraw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp. (
( CVE-2020-22628) in libraw, there is an out-of-bounds write vulnerability within the "new_node()" function (libraw\src\x3f\x3f_utils_patched.cpp) that can be triggered via a crafted x3f file. (
( CVE-2020-35530) in libraw, an out-of-bounds read vulnerability exists within the get_huffman_diff() function (libraw\src\x3f\x3f_utils_patched.cpp) when reading data from an image file. (
( CVE-2020-35531) in libraw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. (
( CVE-2020-35532) buffer overflow vulnerability in libraw linux/unix v0.20.0 allows attacker to escalate privileges via the libraw_buffer_datastream::gets(char*, int) in /src/libraw/src/libraw_datastream.cpp. (
( CVE-2021-32142)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2-2023-2256 -
alas.aws.amazon.com/AL2/ALAS-2023-2256.html
CVEs related to QID 356139
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2-2023-2256 | amazon linux 2 |
|