Gentoo: GLSA-202312-08: LibRaw: Heap Buffer Overflow
Summary
A vulnerability has been discovered in LibRaw. Please review the CVE
identifier referenced below for details.
Resolution
All LibRaw users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-libs/libraw-0.21.1-r1"
References
[ 1 ] CVE-2023-1729
https://nvd.nist.gov/vuln/detail/CVE-2023-1729
Availability
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202312-08
Concerns
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
Background
LibRaw is a library for reading RAW files obtained from digital photo
cameras.
Affected Packages
Package Vulnerable Unaffected
----------------- ------------ ------------
media-libs/libraw < 0.21.1-r1 >= 0.21.1-r1
Impact
A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted
file may lead to an application crash.
Workaround
There is no known workaround at this time.