First published: Thu Apr 20 2023(Updated: )
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libraw | <=0.19.2-2 | 0.19.2-2+deb10u4 0.20.2-1+deb11u1 0.20.2-2.1 0.21.1-7 |
Libraw Libraw | <2023-01-14 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =9.0 | |
Libraw Libraw | <0.21.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-1729 is a vulnerability in LibRaw that allows a heap-buffer-overflow and may lead to an application crash.
The severity of CVE-2023-1729 is medium, with a CVSS score of 6.5.
The affected software versions of LibRaw are 0.19.2-2+deb10u4, 0.20.2-1+deb11u1, 0.20.2-2.1, and 0.21.1-7.
To fix CVE-2023-1729, update LibRaw to version 0.19.2-2+deb10u4, 0.20.2-1+deb11u1, 0.20.2-2.1, or 0.21.1-7.
You can find more information about CVE-2023-1729 at the following references: [Security Tracker Debian](https://security-tracker.debian.org/tracker/CVE-2023-1729), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2188240), [LibRaw GitHub Issue](https://github.com/LibRaw/LibRaw/issues/557).