Bugzilla – Bug 1173517
VUL-0: CVE-2020-15365: libraw: out-of-bounds write in parse_exif function in metadata/exif_gps.cpp
Last modified: 2020-06-30 13:58:24 UTC
CVE-2020-15365 LibRaw before 0.20-Beta3 has an out-of-bounds write in parse_exif() in metadata\exif_gps.cpp via an unrecognized AtomName and a zero value of tiff_nifds. Upstream commit: https://github.com/LibRaw/LibRaw/commit/55f0a0c08974b8b79ebfa7762b555a1704b25fb2 References: https://bugzilla.redhat.com/show_bug.cgi?id=1852093 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15365 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15365 https://github.com/LibRaw/LibRaw/compare/0.20-Beta2...0.20-Beta3 https://github.com/LibRaw/LibRaw/issues/301
SUSE:SLE-12:Update Not reproducible [1] SUSE:SLE-15:Update Not reproducible [1] openSUSE:Leap:15.1:Update Not reproducible [1] openSUSE:Leap:15.2:Update Not reproducible [1] openSUSE:Factory Not reproducible [1] [1] libraw-tools: Cannot open poc.cr3: Unsupported file format or not RAW file. ImageMagick: no decode delegate for this image format `CR3'.
CR3 will be part of 0.20. No older releases are affected, which means even TW is not affected.
*CR3 parser will ...*