Buffer Overflow vulnerability in LibRaw::stretch() function in libraw\src\postprocessing\aspect_ratio.cpp.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://github.com/LibRaw/LibRaw/issues/269 | issue tracking patch exploit third party advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00007.html | third party advisory mailing list |