Unspecified vulnerability in dcraw 0.8.x through 0.8.9, as used in libraw, ufraw, shotwell, and other products, allows context-dependent attackers to cause a denial of service via a crafted photo file that triggers a (1) divide-by-zero, (2) infinite loop, or (3) NULL pointer dereference.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "edisplay", "binary_version": "0.8.9-3build1" }, { "binary_name": "exactimage", "binary_version": "0.8.9-3build1" }, { "binary_name": "exactimage-dbg", "binary_version": "0.8.9-3build1" }, { "binary_name": "libexactimage-perl", "binary_version": "0.8.9-3build1" }, { "binary_name": "php5-exactimage", "binary_version": "0.8.9-3build1" }, { "binary_name": "python-exactimage", "binary_version": "0.8.9-3build1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libraw-bin", "binary_version": "0.15.3-1ubuntu1" }, { "binary_name": "libraw-dev", "binary_version": "0.15.3-1ubuntu1" }, { "binary_name": "libraw-doc", "binary_version": "0.15.3-1ubuntu1" }, { "binary_name": "libraw9", "binary_version": "0.15.3-1ubuntu1" } ] }