DEBIAN-CVE-2015-8366

Advisory lineage Upstream: 1 Downstream: 0
Upstream
Published: 14 Jan 2020, 16:15
Last modified:19 Nov 2025, 02:02

Vulnerability Summary

Overall Risk (default)
high
70/100
CVSS Score
9.8 CRITICAL
3.1 (osv_debian)
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

14 Jan 2020, 16:15
Published
Vulnerability first disclosed
19 Nov 2025, 02:02
Last Modified
Vulnerability information updated

Description

Array index error in smal_decode_segment function in LibRaw before 0.17.1 allows context-dependent attackers to cause memory errors and possibly execute arbitrary code via vectors related to indexes.

CVSS Metrics

  • v3.1CRITICALScore: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Systems

  • debiandarktable

    < 2.0.0-1 | < 2.0.0-1 | < 2.0.0-1 | < 2.0.0-1

  • debiandcraw

    < 9.28-1 | < 9.28-1 | < 9.28-1 | < 9.28-1

  • debianexactimage

    < 0.9.1-13 | < 0.9.1-13 | < 0.9.1-13 | < 0.9.1-13

  • debianlibraw

    < 0.17.1-1 | < 0.17.1-1 | < 0.17.1-1 | < 0.17.1-1

  • debianrawtherapee

    < 4.2.1241-2 | < 4.2.1241-2 | < 4.2.1241-2 | < 4.2.1241-2

References (1)