MGASA-2020-0368

Source
https://advisories.mageia.org/MGASA-2020-0368.html
Import Source
https://advisories.mageia.org/MGASA-2020-0368.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0368
Related
Published
2020-09-17T10:15:49Z
Modified
2020-09-17T09:44:43Z
Summary
Updated libraw packages fix a security vulnerability
Details

LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpackthumb.cpp, postprocessing/memimage.cpp, and utils/thumbutils.cpp. For example, malloc(sizeof(librawprocessedimaget)+T.tlength) occurs without validating T.tlength. (CVE-2020-15503)

References
Credits

Affected packages

Mageia:7 / libraw

Package

Name
libraw
Purl
pkg:rpm/mageia/libraw?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.19.2-1.1.mga7

Ecosystem specific

{
    "section": "core"
}