DEBIAN-CVE-2015-8366
Advisory lineage Upstream: 1 Downstream: 0
Upstream
Published: 14 Jan 2020, 16:15
Last modified:19 Nov 2025, 02:02
Vulnerability Summary
Overall Risk (default)
high
70/100 CVSS Score
9.8 CRITICAL
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected
Timeline
14 Jan 2020, 16:15
Published
Vulnerability first disclosed
19 Nov 2025, 02:02
Last Modified
Vulnerability information updated
Description
Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.
CVSS Metrics
- v3.1•CRITICAL•Score: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Systems
- debian•darktable
< 2.0.0-1 | < 2.0.0-1 | < 2.0.0-1 | < 2.0.0-1
- debian•dcraw
< 9.28-1 | < 9.28-1 | < 9.28-1 | < 9.28-1
- debian•exactimage
< 0.9.1-13 | < 0.9.1-13 | < 0.9.1-13 | < 0.9.1-13
- debian•libraw
< 0.17.1-1 | < 0.17.1-1 | < 0.17.1-1 | < 0.17.1-1
- debian•rawtherapee
< 4.2.1241-2 | < 4.2.1241-2 | < 4.2.1241-2 | < 4.2.1241-2