Name | CVE-2015-8366 |
Description | Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | ELA-529-1 |
Debian Bugs | 806809, 818882, 864168 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
darktable (PTS) | jessie | 1.4.2-1+deb8u1 | fixed |
| stretch | 2.2.1-3 | fixed |
| buster | 2.6.0-1 | fixed |
| bullseye | 3.4.1-5 | fixed |
| bookworm | 4.2.1-4 | fixed |
| sid, trixie | 4.8.1-2 | fixed |
dcraw (PTS) | jessie | 9.21-0.2 | vulnerable |
| stretch | 9.27-1 | vulnerable |
| buster, bullseye | 9.28-2 | fixed |
| bookworm | 9.28-3 | fixed |
| sid, trixie | 9.28-7 | fixed |
exactimage (PTS) | jessie, jessie (lts) | 0.8.9-7+deb8u3 | fixed |
| stretch | 0.9.1-16 | fixed |
| buster | 1.0.2-1+deb10u1 | fixed |
| bullseye | 1.0.2-8 | fixed |
| bookworm | 1.0.2-11 | fixed |
| sid, trixie | 1.0.2-12 | fixed |
kodi (PTS) | stretch | 2:17.1+dfsg1-3 | fixed |
| buster (security), buster, buster (lts) | 2:17.6+dfsg1-4+deb10u1 | fixed |
| bullseye | 2:19.1+dfsg2-2+deb11u1 | fixed |
| bookworm | 2:20.1+dfsg-1 | fixed |
| sid, trixie | 2:21.1+dfsg-5 | fixed |
libraw (PTS) | jessie, jessie (lts) | 0.16.0-9+deb8u6 | fixed |
| stretch (security) | 0.17.2-6+deb9u2 | fixed |
| stretch (lts), stretch | 0.17.2-6+deb9u5 | fixed |
| buster (security), buster, buster (lts) | 0.19.2-2+deb10u4 | fixed |
| bullseye (security), bullseye | 0.20.2-1+deb11u1 | fixed |
| bookworm | 0.20.2-2.1 | fixed |
| sid, trixie | 0.21.3-1 | fixed |
rawtherapee (PTS) | jessie | 4.2-1+deb8u2 | fixed |
| stretch | 5.0-1 | fixed |
| buster | 5.5-1 | fixed |
| bullseye | 5.8-3 | fixed |
| bookworm | 5.9-1 | fixed |
| sid, trixie | 5.11-2 | fixed |
ufraw (PTS) | jessie, jessie (lts) | 0.20-2+deb8u2 | fixed |
| stretch | 0.22-1.1 | fixed |
| buster | 0.22-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
[wheezy] - libraw <not-affected> (Vulnerable code not present)
[squeeze] - libraw <not-affected> (Vulnerable code not present)
[stretch] - dcraw <no-dsa> (Minor issue)
[jessie] - dcraw <no-dsa> (Minor issue)
[wheezy] - dcraw <not-affected> (Vulnerable code not present)
[squeeze] - dcraw <not-affected> (Vulnerable code not present)
- kodi <not-affected> (Vulnerable code not present)
[jessie] - darktable <not-affected> (Vulnerable code not present)
[wheezy] - darktable <not-affected> (Vulnerable code not present)
[squeeze] - darktable <not-affected> (Vulnerable code not present)
[jessie] - ufraw <no-dsa> (Minor issue)
[wheezy] - ufraw <not-affected> (Vulnerable code not present)
[squeeze] - ufraw <not-affected> (Vulnerable code not present)
[wheezy] - rawtherapee <not-affected> (Vulnerable code not present)
[squeeze] - rawtherapee <not-affected> (Vulnerable code not present)
[wheezy] - exactimage <not-affected> (Vulnerable code not present)
[squeeze] - exactimage <not-affected> (Vulnerable code not present)
exactimage: smal_decode_segment inside dcraw.h not dcraw.c
Fixed by: https://github.com/LibRaw/LibRaw/commit/89d065424f09b788f443734d44857289489ca9e2