Unspecified vulnerability in dcraw 0.8.x through 0.8.9, as used in libraw, ufraw, shotwell, and other products, allows context-dependent attackers to cause a denial of service via a crafted photo file that triggers a (1) divide-by-zero, (2) infinite loop, or (3) NULL pointer dereference.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.8.9-3build1", "binary_name": "edisplay" }, { "binary_version": "0.8.9-3build1", "binary_name": "exactimage" }, { "binary_version": "0.8.9-3build1", "binary_name": "exactimage-dbg" }, { "binary_version": "0.8.9-3build1", "binary_name": "libexactimage-perl" }, { "binary_version": "0.8.9-3build1", "binary_name": "php5-exactimage" }, { "binary_version": "0.8.9-3build1", "binary_name": "python-exactimage" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.15.3-1ubuntu1", "binary_name": "libraw-bin" }, { "binary_version": "0.15.3-1ubuntu1", "binary_name": "libraw-dev" }, { "binary_version": "0.15.3-1ubuntu1", "binary_name": "libraw-doc" }, { "binary_version": "0.15.3-1ubuntu1", "binary_name": "libraw9" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "0.19.2-2ubuntu1", "binary_name": "gimp-ufraw" }, { "binary_version": "0.19.2-2ubuntu1", "binary_name": "ufraw" }, { "binary_version": "0.19.2-2ubuntu1", "binary_name": "ufraw-batch" } ] }