Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.893113
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DLA-3113-1)
Summary:The remote host is missing an update for the Debian 'libraw' package(s) announced via the DLA-3113-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'libraw' package(s) announced via the DLA-3113-1 advisory.

Vulnerability Insight:
Multiple file parsing vulnerabilities have been fixed in libraw. They are concerned with the dng and x3f formats.

CVE-2020-35530

There is an out-of-bounds write vulnerability within the 'new_node()' function (src/x3f/x3f_utils_patched.cpp) that can be triggered via a crafted X3F file. Reported by github user 0xfoxone.

CVE-2020-35531

An out-of-bounds read vulnerability exists within the get_huffman_diff() function (src/x3f/x3f_utils_patched.cpp) when reading data from an image file. Reported by github user GirlElecta.

CVE-2020-35532

An out-of-bounds read vulnerability exists within the 'simple_decode_row()' function (src/x3f/x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field. Reported by github user GirlElecta.

CVE-2020-35533

An out-of-bounds read vulnerability exists within the 'LibRaw::adobe_copy_pixel()' function (src/decoders/dng.cpp) when reading data from the image file. Reported by github user GirlElecta.

For Debian 10 buster, these problems have been fixed in version 0.19.2-2+deb10u1.

We recommend that you upgrade your libraw packages.

For the detailed security status of libraw please refer to its security tracker page at: [link moved to references]

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]

Affected Software/OS:
'libraw' package(s) on Debian 10.

Solution:
Please install the updated package(s).

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-35530
https://github.com/LibRaw/LibRaw/commit/11c4db253ef2c9bb44247b578f5caa57c66a1eeb
https://github.com/LibRaw/LibRaw/issues/272
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-35531
https://github.com/LibRaw/LibRaw/commit/d75af00681a74dcc8b929207eb895611a6eceb68
https://github.com/LibRaw/LibRaw/issues/270
Common Vulnerability Exposure (CVE) ID: CVE-2020-35532
https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e
https://github.com/LibRaw/LibRaw/issues/271
Common Vulnerability Exposure (CVE) ID: CVE-2020-35533
https://github.com/LibRaw/LibRaw/commit/a6937d4046a7c4742b683a04c8564605fd9be4fb
https://github.com/LibRaw/LibRaw/issues/273
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.