SUSE-SU-2017:2300-1

Advisory lineage Upstream: 7 Downstream: 0
Published: 30 Aug 2017, 13:16
Last modified:04 Feb 2026, 03:35

Vulnerability Summary

Overall Risk (default)
minimal
0/100
CVSS Score
No data
EPSS Score
No data
KEV
Not listed
Ransomware
No reports
Public exploits
None found
Dark Web
Not detected

Timeline

30 Aug 2017, 13:16
Published
Vulnerability first disclosed
04 Feb 2026, 03:35
Last Modified
Vulnerability information updated

Description

Security update for libraw This update for libraw fixes the following issues: - CVE-2015-3885: A specially crafted raw image file could have caused a Denial of Service through an integer overflow. (bsc#930683) - CVE-2015-8367: The function phase_one_correct() did not handle memory object initialization correctly, which may have caused some other problems. (bsc#957517) - CVE-2017-6886: memory corruption in parse_tiff_ifd() func (internal/dcraw_common.cpp) could lead to Denial of service (bsc#1039380) - CVE-2017-6889: integer overflow error within the 'foveon_load_camf()' function (dcraw_foveon.c) could lead to Denial of service (bsc#1039210) - CVE-2017-6890: boundary error within the 'foveon_load_camf()' function (dcraw_foveon.c) (bsc#1039209)

Affected Systems

  • suselibraw&distro=SUSE Linux Enterprise Desktop 12 SP2

    < 0.15.4-9.2

  • suselibraw&distro=SUSE Linux Enterprise Desktop 12 SP3

    < 0.15.4-9.2

  • suselibraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP2

    < 0.15.4-9.2

  • suselibraw&distro=SUSE Linux Enterprise Software Development Kit 12 SP3

    < 0.15.4-9.2

  • suselibraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP2

    < 0.15.4-9.2

  • suselibraw&distro=SUSE Linux Enterprise Workstation Extension 12 SP3

    < 0.15.4-9.2

References (14)