{"schema_version":"1.7.2","id":"OESA-2024-2364","modified":"2024-11-08T15:07:55Z","published":"2024-11-08T15:07:55Z","upstream":["CVE-2017-13735","CVE-2017-14608","CVE-2018-19655"],"summary":"dcraw security update","details":"This package contains dcraw, a command line tool to decode raw image data downloaded from digital cameras.\r\n\r\nSecurity Fix(es):\r\n\r\n(CVE-2017-13735)\r\n\r\n(CVE-2017-14608)\r\n\r\nA stack-based buffer overflow in the find_green() function of dcraw through 9.28, as used in ufraw-batch and many other products, may allow a remote attacker to cause a control-flow hijack, denial-of-service, or unspecified other impact via a maliciously crafted raw photo file.(CVE-2018-19655)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"dcraw","purl":"pkg:rpm/openEuler/dcraw\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.28.0-7.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["dcraw-9.28.0-7.oe2203sp1.aarch64.rpm","dcraw-debuginfo-9.28.0-7.oe2203sp1.aarch64.rpm","dcraw-debugsource-9.28.0-7.oe2203sp1.aarch64.rpm"],"noarch":["dcraw-help-9.28.0-7.oe2203sp1.noarch.rpm"],"src":["dcraw-9.28.0-7.oe2203sp1.src.rpm"],"x86_64":["dcraw-9.28.0-7.oe2203sp1.x86_64.rpm","dcraw-debuginfo-9.28.0-7.oe2203sp1.x86_64.rpm","dcraw-debugsource-9.28.0-7.oe2203sp1.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-2364"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13735"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-14608"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2018-19655"}],"database_specific":{"severity":"Critical"}}