An issue in LibRaw 0.18.9, stack-based buffer overflow in utf2char function
Reporter | Title | Published | Views | Family All 31 |
---|---|---|---|---|
![]() | Stack overflow | 29 Apr 201803:29 | – | prion |
![]() | CVE-2018-10528 | 29 Apr 201803:29 | – | debiancve |
![]() | CVE-2018-10528 | 29 Apr 201803:00 | – | cvelist |
![]() | CVE-2018-10528 | 29 Apr 201803:29 | – | nvd |
![]() | CVE-2018-10528 | 3 May 201805:19 | – | redhatcve |
![]() | CVE-2018-10528 | 29 Apr 201803:29 | – | cve |
![]() | CVE-2018-10528 | 28 Apr 201800:00 | – | ubuntucve |
![]() | CVE-2018-10528 | 29 Apr 201803:29 | – | osv |
![]() | OPENSUSE-SU-2024:10980-1 libraw-devel-0.20.2-4.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | [SECURITY] Fedora 27 Update: LibRaw-0.18.11-1.fc27 | 15 May 201819:54 | – | fedora |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Alpine | 3.8-community | noarch | libraw | 0.18.13-r0 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo