Array index error in LibRaw allows memory errors and possible code executio
Reporter | Title | Published | Views | Family All 25 |
---|---|---|---|---|
![]() | CVE-2015-8366 | 2 Dec 201500:00 | – | ubuntucve |
![]() | CVE-2015-8366 | 14 Jan 202016:15 | – | osv |
![]() | OPENSUSE-SU-2024:11480-1 gimp-ufraw-0.22-9.4 on GA media | 15 Jun 202400:00 | – | osv |
![]() | Code injection | 14 Jan 202016:15 | – | prion |
![]() | CVE-2015-8366 | 14 Jan 202016:15 | – | cve |
![]() | CVE-2015-8366 | 14 Jan 202016:15 | – | debiancve |
![]() | libraw -- index overflow in smal_decode_segment | 30 Nov 201500:00 | – | freebsd |
![]() | FreeBSD : libraw -- index overflow in smal_decode_segment (db04bf07-9cc8-11e5-8c2b-c335fa8985d7) | 8 Dec 201500:00 | – | nessus |
![]() | Fedora 23 : LibRaw-0.16.2-3.fc23 (2015-d2fc332108) | 4 Mar 201600:00 | – | nessus |
![]() | Fedora 22 : LibRaw-0.16.2-3.fc22 (2015-a288773b9a) | 4 Mar 201600:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | 3.3-main | noarch | libraw | 0.17.1-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo