First published: Fri Dec 07 2018(Updated: )
An error related to the "LibRaw::panasonic_load_raw()" function (dcraw_common.cpp) in LibRaw versions prior to 0.18.6 can be exploited to cause a heap-based buffer overflow and subsequently cause a crash via a specially crafted TIFF image.
Credit: PSIRT-CNA@flexerasoftware.com PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Libraw Libraw | <0.18.6 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
debian/libraw | 0.20.2-1+deb11u1 0.20.2-2.1 0.21.2-2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-16909.
CVE-2017-16909 has a severity rating of 8.8 (high).
LibRaw versions prior to 0.18.6 are affected by CVE-2017-16909.
CVE-2017-16909 can be exploited by using a specially crafted TIFF image to cause a heap-based buffer overflow and subsequently crash the application.
Yes, updating to LibRaw version 0.18.6 or later can remediate the vulnerability.