In LibRaw, an out-of-bounds read vulnerability exists within the "simple_decode_row()" function (libraw\src\x3f\x3f_utils_patched.cpp) which can be triggered via an image with a large row_stride field.
The product reads data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://github.com/LibRaw/LibRaw/issues/271 | issue tracking patch exploit third party advisory |
https://github.com/LibRaw/LibRaw/commit/5ab45b085898e379fedc6b113e2e82a890602b1e | third party advisory patch |
https://lists.debian.org/debian-lts-announce/2022/09/msg00024.html | third party advisory mailing list |