Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-295-01
HistoryOct 22, 2023 - 7:39 p.m.

[slackware-security] LibRaw

2023-10-2219:39:04
Slackware Linux Project
www.slackware.com
18
libraw
slackware
security
buffer overflow
heap-buffer-overflow
upgrade
vulnerabilities

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.6%

New LibRaw packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/LibRaw-0.20.2-i586-4_slack15.0.txz: Rebuilt.
This update fixes security issues:
A Buffer Overflow vulnerability was found in LibRaw_buffer_datastream::
gets(char*, int), which could lead to privilege escalation or application
crash.
A heap-buffer-overflow was found in raw2image_ex(int), which may lead to
application crash by maliciously crafted input file.
For more information, see:
https://vulners.com/cve/CVE-2021-32142
https://vulners.com/cve/CVE-2023-1729
(* Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/LibRaw-0.20.2-i586-4_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/LibRaw-0.20.2-x86_64-4_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/l/LibRaw-0.21.1-i586-2.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/l/LibRaw-0.21.1-x86_64-2.txz

MD5 signatures:

Slackware 15.0 package:
30d1e8c89b0ecbda0a56e65b565a2de6 LibRaw-0.20.2-i586-4_slack15.0.txz

Slackware x86_64 15.0 package:
7df1cbb4d59616018a8946dc5f877094 LibRaw-0.20.2-x86_64-4_slack15.0.txz

Slackware -current package:
a20db87ccde2f271c67d0ac1b76dfaa4 l/LibRaw-0.21.1-i586-2.txz

Slackware x86_64 -current package:
2462d01b3b5be630fcfad055d206d954 l/LibRaw-0.21.1-x86_64-2.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg LibRaw-0.20.2-i586-4_slack15.0.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.6%